Ampere Altra devices before 1.08g and Ampere Altra Max devices before 2.05a allow attackers to control the predictions for return addresses and potentially hijack code flow to execute arbitrary code via a side-channel attack, aka a "Retbleed" issue.
References
Link | Resource |
---|---|
https://amperecomputing.com/products/security-bulletins/retbleed.html | Vendor Advisory |
https://developer.arm.com/documentation/ka005138/1-0/ | Third Party Advisory |
https://amperecomputing.com/products/security-bulletins/retbleed.html | Vendor Advisory |
https://developer.arm.com/documentation/ka005138/1-0/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://amperecomputing.com/products/security-bulletins/retbleed.html - Vendor Advisory | |
References | () https://developer.arm.com/documentation/ka005138/1-0/ - Third Party Advisory |
Information
Published : 2022-08-17 13:15
Updated : 2024-11-21 07:15
NVD link : CVE-2022-37459
Mitre link : CVE-2022-37459
CVE.ORG link : CVE-2022-37459
JSON object : View
Products Affected
amperecomputing
- ampere_altra
- ampere_altra_max_firmware
- ampere_altra_firmware
- ampere_altra_max
CWE
CWE-203
Observable Discrepancy