CVE-2023-20519

A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:amd:genoapi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:genoapi:-:*:*:*:*:*:*:*

History

21 Nov 2023, 20:27

Type Values Removed Values Added
CPE cpe:2.3:h:amd:genoapi:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:genoapi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - Vendor Advisory
First Time Amd milanpi Firmware
Amd genoapi Firmware
Amd genoapi
Amd milanpi
Amd
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3

14 Nov 2023, 19:30

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 19:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-20519

Mitre link : CVE-2023-20519

CVE.ORG link : CVE-2023-20519


JSON object : View

Products Affected

amd

  • genoapi
  • genoapi_firmware
  • milanpi
  • milanpi_firmware
CWE
CWE-416

Use After Free