CVE-2013-6885

The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.
References
Link Resource
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
http://openwall.com/lists/oss-security/2013/11/28/1
http://rhn.redhat.com/errata/RHSA-2014-0285.html
http://secunia.com/advisories/55840
http://security.gentoo.org/glsa/glsa-201407-03.xml
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
http://www.debian.org/security/2015/dsa-3128
http://www.openwall.com/lists/oss-security/2013/12/02/1
http://www.securityfocus.com/bid/63983
http://www.securitytracker.com/id/1029415
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
https://bugzilla.redhat.com/show_bug.cgi?id=1035823
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
http://openwall.com/lists/oss-security/2013/11/28/1
http://rhn.redhat.com/errata/RHSA-2014-0285.html
http://secunia.com/advisories/55840
http://security.gentoo.org/glsa/glsa-201407-03.xml
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
http://www.debian.org/security/2015/dsa-3128
http://www.openwall.com/lists/oss-security/2013/12/02/1
http://www.securityfocus.com/bid/63983
http://www.securitytracker.com/id/1029415
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
https://bugzilla.redhat.com/show_bug.cgi?id=1035823
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:16h_model_processor_firmware:-:*:*:*:*:*:*:*
OR cpe:2.3:h:amd:16h_model_00h_processor:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:16h_model_0fh_processor:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html - () http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html -
References () http://openwall.com/lists/oss-security/2013/11/28/1 - () http://openwall.com/lists/oss-security/2013/11/28/1 -
References () http://rhn.redhat.com/errata/RHSA-2014-0285.html - () http://rhn.redhat.com/errata/RHSA-2014-0285.html -
References () http://secunia.com/advisories/55840 - () http://secunia.com/advisories/55840 -
References () http://security.gentoo.org/glsa/glsa-201407-03.xml - () http://security.gentoo.org/glsa/glsa-201407-03.xml -
References () http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf - () http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf -
References () http://www.debian.org/security/2015/dsa-3128 - () http://www.debian.org/security/2015/dsa-3128 -
References () http://www.openwall.com/lists/oss-security/2013/12/02/1 - () http://www.openwall.com/lists/oss-security/2013/12/02/1 -
References () http://www.securityfocus.com/bid/63983 - () http://www.securityfocus.com/bid/63983 -
References () http://www.securitytracker.com/id/1029415 - () http://www.securitytracker.com/id/1029415 -
References () http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924 - () http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1035823 - () https://bugzilla.redhat.com/show_bug.cgi?id=1035823 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/89335 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/89335 -

Information

Published : 2013-11-29 04:33

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6885

Mitre link : CVE-2013-6885

CVE.ORG link : CVE-2013-6885


JSON object : View

Products Affected

amd

  • 16h_model_00h_processor
  • 16h_model_processor_firmware
  • 16h_model_0fh_processor
CWE
CWE-399

Resource Management Errors