VYPR

rpm package

suse/kernel-firmware&distro=SUSE Linux Enterprise Module for Basesystem 15 SP5

pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5

Vulnerabilities (14)

  • CVE-2023-31315HigAug 12, 2024
    affected < 20230724-150500.3.12.1fixed 20230724-150500.3.12.1

    Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.

  • CVE-2023-20592Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.

  • CVE-2023-20566Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.

  • CVE-2023-20519Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.

  • CVE-2022-23830Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.

  • CVE-2021-26345Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.

  • CVE-2023-20533Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • CVE-2023-20526Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.

  • CVE-2023-20521Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

  • CVE-2022-23820Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

  • CVE-2021-46774Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • CVE-2021-46766Nov 14, 2023
    affected < 20230724-150500.3.9.1fixed 20230724-150500.3.9.1

    Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.

  • CVE-2023-20569Aug 8, 2023
    affected < 20230724-150500.3.6.1fixed 20230724-150500.3.6.1

    A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

  • CVE-2023-20593Jul 24, 2023
    affected < 20230724-150500.3.3.1fixed 20230724-150500.3.3.1

    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.