CVE-2023-20519

A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:amd:genoapi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:genoapi:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - Vendor Advisory () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - Vendor Advisory

21 Nov 2023, 20:27

Type Values Removed Values Added
First Time Amd milanpi
Amd genoapi
Amd genoapi Firmware
Amd milanpi Firmware
Amd
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
CWE CWE-416
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 - Vendor Advisory
CPE cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:genoapi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:genoapi:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*

14 Nov 2023, 19:30

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 19:15

Updated : 2024-11-21 07:41


NVD link : CVE-2023-20519

Mitre link : CVE-2023-20519

CVE.ORG link : CVE-2023-20519


JSON object : View

Products Affected

amd

  • milanpi
  • milanpi_firmware
  • genoapi_firmware
  • genoapi
CWE
CWE-416

Use After Free