Home
MEDIUM: 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:NDefault status
affected
Genoa 1.0.0.E
unaffected
Default status
affected
Turin 1.0.0.6
unaffected
Default status
affected
Genoa 1.0.0.E
unaffected
Default status
affected
EmbMilanPI-SP3 v9 1.0.0.B
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.A
unaffected
Default status
affected
EmbTurinPI-SP5 1.0.0.1
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.A
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.A
unaffected
Description
A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.
Problem types
Product status
Genoa 1.0.0.E
Turin 1.0.0.6
Genoa 1.0.0.E
EmbMilanPI-SP3 v9 1.0.0.B
EmbGenoaPI-SP5 1.0.0.A
EmbTurinPI-SP5 1.0.0.1
EmbGenoaPI-SP5 1.0.0.A
EmbGenoaPI-SP5 1.0.0.A
References
www.amd.com/...es/product-security/bulletin/AMD-SB-3029.html