Home
MEDIUM: 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:NDefault status
affected
Genoa++_1.0.0.H
unaffected
Default status
affected
TurinPI_1.0.0.6
unaffected
Default status
affected
Genoa++_1.0.0.H
unaffected
Default status
affected
EmbMilanPI-SP3 v9 1.0.0.C
unaffected
Default status
affected
EmbTurinPI-SP5_1.0.0.1
unaffected
Description
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
Problem types
CWE-123 Write-what-where Condition
Product status
Genoa++_1.0.0.H
TurinPI_1.0.0.6
Genoa++_1.0.0.H
EmbMilanPI-SP3 v9 1.0.0.C
EmbTurinPI-SP5_1.0.0.1
References
www.amd.com/...es/product-security/bulletin/AMD-SB-3027.html