2021-11-16
|
CVE-2021-26337
|
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
|
Epyc_7002_firmware, Epyc_7003_firmware, Epyc_7232p_firmware, Epyc_7252_firmware, Epyc_7262_firmware, Epyc_7272_firmware, Epyc_7282_firmware, Epyc_72f3_firmware, Epyc_7302_firmware, Epyc_7302p_firmware, Epyc_7313_firmware, Epyc_7313p_firmware, Epyc_7343_firmware, Epyc_7352_firmware, Epyc_73f3_firmware, Epyc_7402_firmware, Epyc_7402p_firmware, Epyc_7413_firmware, Epyc_7443_firmware, Epyc_7443p_firmware, Epyc_7452_firmware, Epyc_7453_firmware, Epyc_74f3_firmware, Epyc_7502_firmware, Epyc_7502p_firmware, Epyc_7513_firmware, Epyc_7532_firmware, Epyc_7542_firmware, Epyc_7543_firmware, Epyc_7543p_firmware, Epyc_7552_firmware, Epyc_75f3_firmware, Epyc_7642_firmware, Epyc_7643_firmware, Epyc_7662_firmware, Epyc_7663_firmware, Epyc_7702_firmware, Epyc_7702p_firmware, Epyc_7713_firmware, Epyc_7713p_firmware, Epyc_7742_firmware, Epyc_7763_firmware, Epyc_7f32_firmware, Epyc_7f52_firmware, Epyc_7f72_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625u_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_pro_3200g_firmware, Ryzen_pro_3200ge_firmware, Ryzen_pro_3350g_firmware, Ryzen_pro_3400g_firmware, Ryzen_pro_3400ge_firmware, Ryzen_pro_3600_firmware, Ryzen_pro_3700_firmware, Ryzen_pro_3900_firmware, Ryzen_pro_5350g_firmware, Ryzen_pro_5350ge_firmware, Ryzen_pro_5650g_firmware, Ryzen_pro_5650ge_firmware, Ryzen_pro_5750g_firmware, Ryzen_pro_5750ge_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
5.5
|
|
|
2022-02-04
|
CVE-2020-12965
|
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
|
Athlon_3050ge_firmware, Athlon_3150g_firmware, Athlon_3150ge_firmware, Athlon_gold_pro_3150g_firmware, Athlon_gold_pro_3150ge_firmware, Athlon_pro_200ge_firmware, Athlon_pro_300ge_firmware, Athlon_silver_pro_3125ge_firmware, Ryzen_4300g_firmware, Ryzen_4300ge_firmware, Ryzen_4600g_firmware, Ryzen_4600ge_firmware, Ryzen_4700g_firmware, Ryzen_4700ge_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_pro_2200g_firmware, Ryzen_pro_2200ge_firmware, Ryzen_pro_2400g_firmware, Ryzen_pro_2400ge_firmware, Ryzen_pro_3200g_firmware, Ryzen_pro_3200ge_firmware, Ryzen_pro_3350g_firmware, Ryzen_pro_3400g_firmware, Ryzen_pro_3400ge_firmware, Ryzen_pro_3600_firmware, Ryzen_pro_3700_firmware, Ryzen_pro_3900_firmware, Ryzen_pro_4350g_firmware, Ryzen_pro_4350ge_firmware, Ryzen_pro_4650g_firmware, Ryzen_pro_4650ge_firmware, Ryzen_pro_4750g_firmware, Ryzen_pro_4750ge_firmware, Ryzen_pro_5350g_firmware, Ryzen_pro_5350ge_firmware, Ryzen_pro_5650g_firmware, Ryzen_pro_5650ge_firmware, Ryzen_pro_5750g_firmware, Ryzen_pro_5750ge_firmware, Ryzen_threadripper_1900x_firmware, Ryzen_threadripper_1920x_firmware, Ryzen_threadripper_1950x_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware
|
7.5
|
|
|
2022-05-12
|
CVE-2021-26317
|
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
|
Athlon_3050ge_firmware, Athlon_3150g_firmware, Athlon_3150ge_firmware, Radeon_software, Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
7.8
|
|
|
2022-05-12
|
CVE-2021-26386
|
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call to the Stage 2 Bootloader potentially leading to corrupt memory and code execution.
|
Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
7.8
|
|
|
2022-05-12
|
CVE-2021-26368
|
Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.
|
Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
4.4
|
|
|
2022-11-15
|
CVE-2022-29277
|
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton:...
|
Genoa_firmware, Hygon_1_firmware, Hygon_2_firmware, Hygon_3_firmware, Milan_firmware, Rome_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Snowy_owl_r1000_firmware, Snowy_owl_r2000_firmware, Snowy_owl_v2000_firmware, Snowy_owl_v3000_firmware, Alder_lake_firmware, Bakerville_firmware, Cedar_island_firmware, Comet_lake\-S_firmware, Denverton_firmware, Eagle_stream_firmware, Grangeville_de_ns_firmware, Granville_de_firmware, Greenlow\-R_firmware, Greenlow_firmware, Idaville_firmware, Mehlow\-R_firmware, Mehlow_firmware, Purley\-R_firmware, Tatlow_firmware, Tiger_lake_h\/up3_firmware, Whiskey_lake_firmware, Whitley_firmware
|
8.8
|
|
|