Show filters
98 Total Results
Displaying 91-98 of 98
Sort by:
Attacker Value
Unknown

CVE-2021-26318

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
Attacker Value
Unknown

CVE-2020-12965

Disclosure Date: August 10, 2021 (last updated February 23, 2025)
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
Attacker Value
Unknown

CVE-2018-8935

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in the ASIC, aka CHIMERA-HW.
0
Attacker Value
Unknown

CVE-2018-8930

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient enforcement of Hardware Validated Boot, aka MASTERKEY-1, MASTERKEY-2, and MASTERKEY-3.
0
Attacker Value
Unknown

CVE-2018-8932

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The AMD Ryzen and Ryzen Pro processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-2, RYZENFALL-3, and RYZENFALL-4.
0
Attacker Value
Unknown

CVE-2018-8931

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The AMD Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-1.
0
Attacker Value
Unknown

CVE-2018-8934

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in firmware, aka CHIMERA-FW.
0
Attacker Value
Unknown

CVE-2018-8936

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips allow Platform Security Processor (PSP) privilege escalation.
0