A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: AMD
Published: 2023-11-14T18:53:36.329Z
Updated: 2023-11-14T18:53:36.329Z
Reserved: 2022-10-27T18:53:39.736Z
Link: CVE-2023-20519
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-14T19:15:15.533
Modified: 2023-11-21T20:27:42.837
Link: CVE-2023-20519
JSON object: View
Redhat Information
No data.
CWE