Execution Unit Scheduler Contention Side-Channel-Vulnerabilities on AMD processors

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

Vulnerabilities in AMD processors Side channels can lead to security gaps where security mechanisms can be bypassed and sensitive data can be stolen. [1][2]

Background information

Conflicts in the Execution Unit Scheduler can lead to a Side-Channel vulnerability that appear in AMD CPU microarchitectures with the codenames 'Zen 1', 'Zen 2', 'Zen 3' and 'Zen 4' that use simultaneous multithreading (SMT).

The attacker may receive potential confidential information by measuring the conflict level in the scheduler queues. The linked pages provide information on which processors are affected and further details.

Updates for products of Thomas-Krenn

You will find updates to the corresponding system in the download area of Thomas-Krenn, as soon as they are available.

More information

References

  1. AMD-Side-Channel-SQUIP ([1],phoronix.com 09.08.2022)
  2. Side-Channnel Attack targets AMD Prozzesors ([2],securityweek.com 09.08.2023)


Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Important information for data loss
PCIe Reference Clock
Supermicro X12SPL-F with Proxmox VE 7 ethX instead of enoX NICs with BIOS 1.1