First published: Tue Jun 27 2023(Updated: )
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. Under specific microarchitectural circumstances, a register in “Zen 2” CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information. Refer: <a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html">https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
AMD Zen CPUs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2217845 is considered significant due to the potential for sensitive information disclosure.
To mitigate REDHAT-BUG-2217845, it is advised to apply the latest firmware updates and follow AMD's security guidelines for Zen 2 CPUs.
Users of AMD Zen 2 CPUs may be affected by REDHAT-BUG-2217845 under specific microarchitectural conditions.
REHAT-BUG-2217845 is a CPU vulnerability that may allow unauthorized access to sensitive data.
To protect against REDHAT-BUG-2217845, ensure to regularly update your system firmware and apply security patches provided by your vendor.