cve/2023/CVE-2023-20569.md

44 lines
4.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569)
![](https://img.shields.io/static/v1?label=Product&message=%201st%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%205000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=2nd%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20EPYC%E2%84%A2%20%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=4th%20Gen%20AMD%20EPYC%E2%84%A2%20%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%203000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%20PRO%203000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Vega%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%204000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors%20&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%207000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%207000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%207040%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%203000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%203000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Vega%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%204000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%205000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%205000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20PRO%206000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%202000%20Series%20Processors%20&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlledaddress, potentially leading to information disclosure.
### POC
#### Reference
- https://comsec.ethz.ch/research/microarch/inception/
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/speed47/spectre-meltdown-checker