Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: Kernel (AMD Inception) #1156

Closed
dongsupark opened this issue Aug 9, 2023 · 1 comment
Closed

update: Kernel (AMD Inception) #1156

dongsupark opened this issue Aug 9, 2023 · 1 comment
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns

Comments

@dongsupark
Copy link
Member

dongsupark commented Aug 9, 2023

Name: Kernel (AMD Inception)
CVEs: CVE-2023-20569
CVSSs: 7.5
Action Needed: update to >= 5.10.189, 5.15.125, 6.1.44

Summary: AMD has received an external report titled ‘INCEPTION’, describing a new speculative side channel attack. The attack can result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. This attack is similar to previous branch prediction-based attacks like Spectrev2 and Branch Type Confusion (BTC)/RetBleed. As with similar attacks, speculation is constrained within the current address space and to exploit, an attacker must have knowledge of the address space and control of sufficient registers at the time of RET (return from procedure) speculation. Hence, AMD believes this vulnerability is only potentially exploitable locally, such as via downloaded malware, and recommends customers employ security best practices, including running up-to-date software and malware detection tools.

See also https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html.

refmap.gentoo: https://bugs.gentoo.org/911940

@dongsupark
Copy link
Member Author

Fixed in LTS 3033.3.17, Stable 3510.2.7, Beta 3602.1.5, Alpha 3717.0.0.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns
Projects
None yet
Development

No branches or pull requests

1 participant