Execution Unit Scheduler Contention Side-Channel-Vulnerabilities on AMD processors
Vulnerabilities in AMD processors Side channels can lead to security gaps where security mechanisms can be bypassed and sensitive data can be stolen. [1][2]
Background information
Conflicts in the Execution Unit Scheduler can lead to a Side-Channel vulnerability that appear in AMD CPU microarchitectures with the codenames 'Zen 1', 'Zen 2', 'Zen 3' and 'Zen 4' that use simultaneous multithreading (SMT).
The attacker may receive potential confidential information by measuring the conflict level in the scheduler queues. The linked pages provide information on which processors are affected and further details.
Updates for products of Thomas-Krenn
You will find updates to the corresponding system in the download area of Thomas-Krenn, as soon as they are available.
More information
- AMD-SB-1039 (AMD [3], 18.12.2023)
- CVE-2021-46778 (CVE [4], 09.08.2023)
References
- ↑ AMD-Side-Channel-SQUIP ([1],phoronix.com 09.08.2022)
- ↑ Side-Channnel Attack targets AMD Prozzesors ([2],securityweek.com 09.08.2023)
|
Translator: Alina Ranzinger Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.
|

