Closed joergroedel closed 7 months ago
There are a couple of race conditions in how the SVSM core protocol handling is implemented. These issues can be used by an attacker to leak data out of the SVSM or escalate privileges of lower VMPLs.
There are a couple of race conditions in how the SVSM core protocol handling is implemented. These issues can be used by an attacker to leak data out of the SVSM or escalate privileges of lower VMPLs.