CVE-2022-27672Sensitive Information Exposure in AMD 1ST GEN AMD Epyc Processors

35 documents8 sources
Severity
4.7MEDIUMNVD
EPSS
0.1%
top 69.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 1
Latest updateOct 17

Description

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.0 | Impact: 3.6

Affected Packages16 packages

CVEListV5amd/2nd_gen_amd_ryzen_threadripper_processorsContact your OS vendor
CVEListV5amd/3rd_gen_amd_ryzen_threadripper_processorsContact your OS vendor
CVEListV5amd/athlon_mobile_processorsContact your OS vendor
CVEListV5amd/1st_gen_amd_epyc_processorsContact your OS vendor
CVEListV5amd/2nd_gen_amd_epyc_processorsContact your OS vendor

🔴Vulnerability Details

14
OSV
linux-azure vulnerabilities2023-10-17
OSV
linux-kvm vulnerabilities2023-10-05
OSV
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-oracle vulnerabilities2023-09-26
OSV
linux-oem-6.0 vulnerabilities2023-09-19
OSV
linux-intel-iotg vulnerabilities2023-06-01

📋Vendor Advisories

19
Ubuntu
Linux kernel (Azure) vulnerabilities2023-10-17
Ubuntu
Linux kernel (KVM) vulnerabilities2023-10-05
Ubuntu
Linux kernel vulnerabilities2023-09-26
Ubuntu
Linux kernel (OEM) vulnerabilities2023-09-19
Ubuntu
Linux kernel (Azure) vulnerabilities2023-09-04

💬Community

1
Bugzilla
CVE-2022-27672 kernel: AMD: Cross-Thread Return Address Predictions2023-03-02
CVE-2022-27672 — Sensitive Information Exposure in AMD | cvebase