AMD News Articles
Recent news articles refferecing the vendors vulnerabilities.

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code
A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master Utility.
Google Uncover Critical AMD CPU Vulnerability Affecting Confidential Computing
Google's Security Team has disclosed a high-severity vulnerability in AMD's CPU microcode signature verification system, affecting multiple AMD processors. The flaw, tracked as CVE-2024-56161, could...
AMD, Google disclose Zen processor microcode vulnerability | TechTa...
AMD and Google on Monday disclosed CVE-2024-56161, a high-severity microcode signature verification vulnerability affecting AMD Zen processors.

AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access
CVE-2024-56161 exposes AMD SEV-SNP to malicious microcode attacks, risking VM data integrity. Discovered by Google, rated CVSS 7.2.
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.

New GhostRace Attack Impacts Major CPU, Software Vendors | LinuxSecurity.com
What Is the GhostRace Attack? IBM and VU Amsterdam University researchers have identified a new
Risky Biz News: NIST NVD stopped enriching CVEs a month ago
In other news: LockBit member sentenced to prison; CIA runs anti-China info-op; new GhostRace side-channel attack.
Researchers Disclose Proof of Concept for New GhostRace Attack
IBM and VU Amsterdam University researchers published on March 12th their study about the new GhostRace attack type.

GhostRace - vusec
Exploiting and Mitigating Speculative Race Conditions GhostRace: CVE-2024-2193 Race conditions arise when multiple threads attempt to access a shared resource without proper synchronization, often leading to vulnerabilities such as concurrent use-after-free. To mitigate their occurrence, operating s...