Bug 2224069 (CVE-2023-20564) - CVE-2023-20564 hw: amd: RyzenTM Master allow memory reads/writes potentially leading to confidentiality threat
Summary: CVE-2023-20564 hw: amd: RyzenTM Master allow memory reads/writes potentially ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-20564
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2224074
TreeView+ depends on / blocked
 
Reported: 2023-07-19 17:42 UTC by Rohit Keshri
Modified: 2023-08-08 23:01 UTC (History)
43 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD RyzenTM Master may permit a privileged attacker to perform memory reads and writes, potentially leading to a loss of confidentiality or arbitrary kernel execution.
Clone Of:
Environment:
Last Closed: 2023-08-08 23:01:05 UTC
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2023-07-19 17:42:15 UTC
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD RyzenTM Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.

AMD RyzenTM Master is a software tool that provides the users access to advanced settings, such as clock and

voltage settings, to control system performance in real-time.

Refer:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7004.html

Comment 6 Product Security DevOps Team 2023-08-08 23:01:01 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-20564


Note You need to log in before you can comment on or make changes to this bug.