Product:

Ryzen_5300ge_firmware

(Amd)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 16
Date Id Summary Products Score Patch Annotated
2023-05-09 CVE-2021-46792 Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial of service. Athlon_gold_3150g_firmware, Athlon_gold_3150ge_firmware, Athlon_silver_3050ge_firmware, Ryzen_1200_\(Af\)_firmware, Ryzen_1600_\(Af\)_firmware, Ryzen_2200g_firmware, Ryzen_2200ge_firmware, Ryzen_2300x_firmware, Ryzen_2400g_firmware, Ryzen_2400ge_firmware, Ryzen_2500x_firmware, Ryzen_2600_firmware, Ryzen_2600e_firmware, Ryzen_2600x_firmware, Ryzen_2700_firmware, Ryzen_2700e_firmware, Ryzen_2700x_firmware, Ryzen_2920x_firmware, Ryzen_2950x_firmware, Ryzen_2970wx_firmware, Ryzen_2990wx_firmware, Ryzen_3100_firmware, Ryzen_3300x_firmware, Ryzen_3500_firmware, Ryzen_3500x_firmware, Ryzen_3600_firmware, Ryzen_3600x_firmware, Ryzen_3600xt_firmware, Ryzen_3800x_firmware, Ryzen_3800xt_firmware, Ryzen_3900_firmware, Ryzen_3900x_firmware, Ryzen_3900xt_firmware, Ryzen_3950x_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5500_firmware, Ryzen_5600_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5700x_firmware, Ryzen_5800_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900_firmware, Ryzen_5900x_firmware, Ryzen_5945wx_firmware, Ryzen_5950x_firmware, Ryzen_5955wx_firmware, Ryzen_5965wx_firmware, Ryzen_5975wx_firmware, Ryzen_5995wx_firmware 5.9
2023-05-09 CVE-2021-46759 Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity. Athlon_gold_3150g_firmware, Athlon_gold_3150ge_firmware, Athlon_silver_3050ge_firmware, Ryzen_1200_\(Af\)_firmware, Ryzen_1600_\(Af\)_firmware, Ryzen_2200g_firmware, Ryzen_2200ge_firmware, Ryzen_2300x_firmware, Ryzen_2400g_firmware, Ryzen_2400ge_firmware, Ryzen_2500x_firmware, Ryzen_2600_firmware, Ryzen_2600e_firmware, Ryzen_2600x_firmware, Ryzen_2700_firmware, Ryzen_2700e_firmware, Ryzen_2700x_firmware, Ryzen_2920x_firmware, Ryzen_2950x_firmware, Ryzen_2970wx_firmware, Ryzen_2990wx_firmware, Ryzen_3100_firmware, Ryzen_3300x_firmware, Ryzen_3500_firmware, Ryzen_3500x_firmware, Ryzen_3600_firmware, Ryzen_3600x_firmware, Ryzen_3600xt_firmware, Ryzen_3800x_firmware, Ryzen_3800xt_firmware, Ryzen_3900_firmware, Ryzen_3900x_firmware, Ryzen_3900xt_firmware, Ryzen_3950x_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5500_firmware, Ryzen_5600_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5700x_firmware, Ryzen_5800_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900_firmware, Ryzen_5900x_firmware, Ryzen_5945wx_firmware, Ryzen_5950x_firmware, Ryzen_5955wx_firmware, Ryzen_5965wx_firmware, Ryzen_5975wx_firmware, Ryzen_5995wx_firmware, Ryzen_pro_2100ge_firmware 6.1
2023-05-09 CVE-2021-46794 Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service. Athlon_gold_3150g_firmware, Athlon_gold_3150ge_firmware, Athlon_silver_3050ge_firmware, Ryzen_1200_\(Af\)_firmware, Ryzen_1600_\(Af\)_firmware, Ryzen_2200g_firmware, Ryzen_2200ge_firmware, Ryzen_2300x_firmware, Ryzen_2400g_firmware, Ryzen_2400ge_firmware, Ryzen_2500x_firmware, Ryzen_2600_firmware, Ryzen_2600e_firmware, Ryzen_2600x_firmware, Ryzen_2700_firmware, Ryzen_2700e_firmware, Ryzen_2700x_firmware, Ryzen_2920x_firmware, Ryzen_2950x_firmware, Ryzen_2970wx_firmware, Ryzen_2990wx_firmware, Ryzen_3100_firmware, Ryzen_3300x_firmware, Ryzen_3500_firmware, Ryzen_3500x_firmware, Ryzen_3600_firmware, Ryzen_3600x_firmware, Ryzen_3600xt_firmware, Ryzen_3800x_firmware, Ryzen_3800xt_firmware, Ryzen_3900_firmware, Ryzen_3900x_firmware, Ryzen_3900xt_firmware, Ryzen_3950x_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5500_firmware, Ryzen_5600_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5700x_firmware, Ryzen_5800_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900_firmware, Ryzen_5900x_firmware, Ryzen_5945wx_firmware, Ryzen_5950x_firmware, Ryzen_5955wx_firmware, Ryzen_5965wx_firmware, Ryzen_5975wx_firmware, Ryzen_5995wx_firmware, Ryzen_pro_2100ge_firmware 7.5
2022-11-15 CVE-2022-29277 Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton:... Genoa_firmware, Hygon_1_firmware, Hygon_2_firmware, Hygon_3_firmware, Milan_firmware, Rome_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Snowy_owl_r1000_firmware, Snowy_owl_r2000_firmware, Snowy_owl_v2000_firmware, Snowy_owl_v3000_firmware, Alder_lake_firmware, Bakerville_firmware, Cedar_island_firmware, Comet_lake\-S_firmware, Denverton_firmware, Eagle_stream_firmware, Grangeville_de_ns_firmware, Granville_de_firmware, Greenlow\-R_firmware, Greenlow_firmware, Idaville_firmware, Mehlow\-R_firmware, Mehlow_firmware, Purley\-R_firmware, Tatlow_firmware, Tiger_lake_h\/up3_firmware, Whiskey_lake_firmware, Whitley_firmware 8.8
2021-11-16 CVE-2021-26337 Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests. Epyc_7002_firmware, Epyc_7003_firmware, Epyc_7232p_firmware, Epyc_7252_firmware, Epyc_7262_firmware, Epyc_7272_firmware, Epyc_7282_firmware, Epyc_72f3_firmware, Epyc_7302_firmware, Epyc_7302p_firmware, Epyc_7313_firmware, Epyc_7313p_firmware, Epyc_7343_firmware, Epyc_7352_firmware, Epyc_73f3_firmware, Epyc_7402_firmware, Epyc_7402p_firmware, Epyc_7413_firmware, Epyc_7443_firmware, Epyc_7443p_firmware, Epyc_7452_firmware, Epyc_7453_firmware, Epyc_74f3_firmware, Epyc_7502_firmware, Epyc_7502p_firmware, Epyc_7513_firmware, Epyc_7532_firmware, Epyc_7542_firmware, Epyc_7543_firmware, Epyc_7543p_firmware, Epyc_7552_firmware, Epyc_75f3_firmware, Epyc_7642_firmware, Epyc_7643_firmware, Epyc_7662_firmware, Epyc_7663_firmware, Epyc_7702_firmware, Epyc_7702p_firmware, Epyc_7713_firmware, Epyc_7713p_firmware, Epyc_7742_firmware, Epyc_7763_firmware, Epyc_7f32_firmware, Epyc_7f52_firmware, Epyc_7f72_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625u_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_pro_3200g_firmware, Ryzen_pro_3200ge_firmware, Ryzen_pro_3350g_firmware, Ryzen_pro_3400g_firmware, Ryzen_pro_3400ge_firmware, Ryzen_pro_3600_firmware, Ryzen_pro_3700_firmware, Ryzen_pro_3900_firmware, Ryzen_pro_5350g_firmware, Ryzen_pro_5350ge_firmware, Ryzen_pro_5650g_firmware, Ryzen_pro_5650ge_firmware, Ryzen_pro_5750g_firmware, Ryzen_pro_5750ge_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware 5.5
2022-05-12 CVE-2021-26368 Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service. Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware 4.4