AMD Response to “ZENHAMMER: Rowhammer Attacks on AMD Zen-Based Platforms”, April 09, 2024
Description: On February 26, 2024, AMD received new research related to an industry-wide DRAM issue documented in “ZENHAMMER: Rowhammering Attacks on AMD Zen-based Platforms” from researchers at ETH Zurich. The research demonstrates performing Rowhammer attacks on DDR4 and DDR5 memory using AMD “Zen” platforms. Given the history around Rowhammer, the researchers do not consider these rowhammering attacks to be a new issue.
AMD-SB-7021
AMD-SB-7021
2024-03-12
Speculative Race Conditions (SRCs), March 12, 2024
Description: Researchers from IBM Research Europe and Vrije Universiteit Amsterdam have published a paper titled “GhostRace: Exploiting and Mitigating Speculative Race Conditions.” AMD recommends following previously published guidance regarding Spectre type attacks:
AMD-SB-7016
CVE-2024-2193
AMD-SB-7016
2024-02-13
SEV-SNP Firmware Vulnerabilitie, February 13, 2024
Description: This bulletin addresses two SEV firmware vulnerabilities reported by an external researcher.
AMD-SB-3007
CVE-2023-31347
CVE-2023-31346
AMD-SB-3007
2024-02-13
AMD Embedded Processors Vulnerabilities – February 2024, February 13, 2024
Description: Potential vulnerabilities in AMD Embedded processors were reported, and mitigations are being provided through Platform Initialization (PI) firmware packages.
AMD-SB-5001
CVE-2023-20526
CVE-2023-20521
CVE-2022-23830
CVE-2021-46766
CVE-2021-46762
CVE-2021-26345
CVE-2023-20571
CVE-2023-20566
CVE-2023-20533
CVE-2021-46774
CVE-2021-46754
CVE-2021-26393
CVE-2021-26392
CVE-2023-20565
CVE-2023-20563
CVE-2022-23821
CVE-2022-23820
CVE-2021-46757
CVE-2020-12931
CVE-2020-12930
AMD-SB-5001
2024-01-09
Debug Exception Delivery in Secure Nested Pagin, Jan 09, 2024
Description: A researcher has reported that a host can potentially suppress delivery of debug exceptions to SEV-SNP guests that have the restricted injection feature enabled. For example, a software-based debugger generating hardware-based exceptions for the purpose of debugging may not see the exceptions delivered to the VM guest. In particular, hardware debug traps such as single-stepping and data breakpoints may not be observed in the guest.
This website uses essential and analytics cookies. You can choose your option by clicking "Accept All Cookies" or "Accept Essential Cookies" as Cookies Preferences.