mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
44 lines
4.2 KiB
Markdown
44 lines
4.2 KiB
Markdown
![]() |
### [CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569)
|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
- https://comsec.ethz.ch/research/microarch/inception/
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/EGI-Federation/SVG-advisories
|
|||
|
- https://github.com/speed47/spectre-meltdown-checker
|
|||
|
|