A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory |
Configurations
History
21 Nov 2023, 20:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:amd:genoapi:-:*:*:*:*:*:*:* cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:genoapi_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:* |
|
References | () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - Vendor Advisory | |
First Time |
Amd milanpi Firmware
Amd genoapi Firmware Amd genoapi Amd milanpi Amd |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
14 Nov 2023, 19:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 19:15
Updated : 2023-12-10 15:26
NVD link : CVE-2023-20519
Mitre link : CVE-2023-20519
CVE.ORG link : CVE-2023-20519
JSON object : View
Products Affected
amd
- genoapi
- genoapi_firmware
- milanpi
- milanpi_firmware
CWE
CWE-416
Use After Free