{"id":"CVE-2023-31315","details":"Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.","modified":"2026-03-11T07:45:22.566596461Z","published":"2024-08-12T13:38:10Z","withdrawn":"2026-01-27T04:18:53.961859Z","related":["SUSE-SU-2024:2911-1","SUSE-SU-2024:2943-1","SUSE-SU-2024:2944-1","SUSE-SU-2024:2980-1","SUSE-SU-2024:3081-1","SUSE-SU-2024:4255-1","SUSE-SU-2025:20129-1","SUSE-SU-2025:20227-1","openSUSE-SU-2024:14266-1"],"references":[{"type":"WEB","url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html"},{"type":"WEB","url":"https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Enrique%20Nissim%20Krzysztof%20Okupski%20-%20AMD%20Sinkclose%20Universal%20Ring-2%20Privilege%20Escalation.pdf"},{"type":"WEB","url":"https://news.ycombinator.com/item?id=41475975"},{"type":"WEB","url":"https://www.darkreading.com/remote-workforce/amd-issues-updates-for-silicon-level-sinkclose-flaw"}],"schema_version":"1.7.3"}