EGI SVG Advisories

Advisory-EGI-SVG-2024-18

HIGH risk SinkClose flaw in AMD EPYC processors

Date: 2024-12-04
Updated: 2025-01-29

HIGH risk vulnerability concerning a flaw in AMD EPYC processors which may allow privilege escalation. [R 1] This may be exploited on systems where a user has access to a system where they can run code, such as Worker Nodes (WNs), User Interfaces (UI), VObox, and FedCloud hosts.

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2024-18

CVE ID : CVE-2023-31315

CVSS Score : 7.5 [R 2]

AFFECTED CPUs

Many AMD CPU models are affected, including all EPYC generations. See [R 1] for the complete list.

ACTIONS REQUIRED/RECOMMENDED

Sites are recommended to update firmware if they are running vulnerable systems as soon as possible using references below if they have not done so already.

MITIGATION

RedHat states that ‘Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.’

MORE INFORMATION

See references below.

We apologise for having missed sending this information earlier!

STATUS OF THIS ADVISORY

TLP:AMBER information - Limited distribution

This advisory will be made public on or after 2025-01-02 at

https://advisories.egi.eu/Advisory-EGI-SVG-2024-18

https://advisories.egi.eu/Advisory-SVG-CVE-2023-31315

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. -----------------------------

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

SVG was alerted to this vulnerability by Barbara Krasovec