Vulnerabilites related to AMD - 7th Generation AMD A-Series APUs
cve-2022-27672
Vulnerability from cvelistv5
Published
2023-02-14 19:34
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target
from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 1st Gen AMD EPYC™ Processors |
Version: |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.968Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "http://xenbits.xen.org/xsa/advisory-426.html", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045", }, { tags: [ "x_transferred", ], url: "https://security.gentoo.org/glsa/202402-07", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", platforms: [ "x86", ], product: "1st Gen AMD EPYC™ Processors", vendor: " AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "2nd Gen AMD EPYC™ Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Athlon™ X4 Processor", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ Threadripper™ PRO Processor", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "2nd Gen AMD Ryzen™ Threadripper™ Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "3rd Gen AMD Ryzen™ Threadripper™ Processors", vendor: "AMD ", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "7th Generation AMD A-Series APUs", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 2000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 3000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 4000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, { defaultStatus: "affected", platforms: [ "x86", ], product: "Athlon™ Mobile Processors", vendor: "AMD", versions: [ { status: "affected", version: " ", }, ], }, ], datePublic: "2023-02-14T17:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\nWhen SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.\n\n\n", }, ], value: "\nWhen SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.\n\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-01T05:44:22.188214Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045", }, { url: "https://security.gentoo.org/glsa/202402-07", }, ], source: { advisory: " AMD-SB-1045", discovery: "INTERNAL", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2022-27672", datePublished: "2023-02-14T19:34:54.028Z", dateReserved: "2022-03-23T14:57:22.754Z", dateUpdated: "2024-08-03T05:32:59.968Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }