2021-11-16
|
CVE-2021-26337
|
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
|
Epyc_7002_firmware, Epyc_7003_firmware, Epyc_7232p_firmware, Epyc_7252_firmware, Epyc_7262_firmware, Epyc_7272_firmware, Epyc_7282_firmware, Epyc_72f3_firmware, Epyc_7302_firmware, Epyc_7302p_firmware, Epyc_7313_firmware, Epyc_7313p_firmware, Epyc_7343_firmware, Epyc_7352_firmware, Epyc_73f3_firmware, Epyc_7402_firmware, Epyc_7402p_firmware, Epyc_7413_firmware, Epyc_7443_firmware, Epyc_7443p_firmware, Epyc_7452_firmware, Epyc_7453_firmware, Epyc_74f3_firmware, Epyc_7502_firmware, Epyc_7502p_firmware, Epyc_7513_firmware, Epyc_7532_firmware, Epyc_7542_firmware, Epyc_7543_firmware, Epyc_7543p_firmware, Epyc_7552_firmware, Epyc_75f3_firmware, Epyc_7642_firmware, Epyc_7643_firmware, Epyc_7662_firmware, Epyc_7663_firmware, Epyc_7702_firmware, Epyc_7702p_firmware, Epyc_7713_firmware, Epyc_7713p_firmware, Epyc_7742_firmware, Epyc_7763_firmware, Epyc_7f32_firmware, Epyc_7f52_firmware, Epyc_7f72_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625u_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_pro_3200g_firmware, Ryzen_pro_3200ge_firmware, Ryzen_pro_3350g_firmware, Ryzen_pro_3400g_firmware, Ryzen_pro_3400ge_firmware, Ryzen_pro_3600_firmware, Ryzen_pro_3700_firmware, Ryzen_pro_3900_firmware, Ryzen_pro_5350g_firmware, Ryzen_pro_5350ge_firmware, Ryzen_pro_5650g_firmware, Ryzen_pro_5650ge_firmware, Ryzen_pro_5750g_firmware, Ryzen_pro_5750ge_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
5.5
|
|
|
2022-02-04
|
CVE-2020-12965
|
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
|
Athlon_3050ge_firmware, Athlon_3150g_firmware, Athlon_3150ge_firmware, Athlon_gold_pro_3150g_firmware, Athlon_gold_pro_3150ge_firmware, Athlon_pro_200ge_firmware, Athlon_pro_300ge_firmware, Athlon_silver_pro_3125ge_firmware, Ryzen_4300g_firmware, Ryzen_4300ge_firmware, Ryzen_4600g_firmware, Ryzen_4600ge_firmware, Ryzen_4700g_firmware, Ryzen_4700ge_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_pro_2200g_firmware, Ryzen_pro_2200ge_firmware, Ryzen_pro_2400g_firmware, Ryzen_pro_2400ge_firmware, Ryzen_pro_3200g_firmware, Ryzen_pro_3200ge_firmware, Ryzen_pro_3350g_firmware, Ryzen_pro_3400g_firmware, Ryzen_pro_3400ge_firmware, Ryzen_pro_3600_firmware, Ryzen_pro_3700_firmware, Ryzen_pro_3900_firmware, Ryzen_pro_4350g_firmware, Ryzen_pro_4350ge_firmware, Ryzen_pro_4650g_firmware, Ryzen_pro_4650ge_firmware, Ryzen_pro_4750g_firmware, Ryzen_pro_4750ge_firmware, Ryzen_pro_5350g_firmware, Ryzen_pro_5350ge_firmware, Ryzen_pro_5650g_firmware, Ryzen_pro_5650ge_firmware, Ryzen_pro_5750g_firmware, Ryzen_pro_5750ge_firmware, Ryzen_threadripper_1900x_firmware, Ryzen_threadripper_1920x_firmware, Ryzen_threadripper_1950x_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware
|
7.5
|
|
|
2022-05-12
|
CVE-2021-26317
|
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
|
Athlon_3050ge_firmware, Athlon_3150g_firmware, Athlon_3150ge_firmware, Radeon_software, Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
7.8
|
|
|
2022-05-12
|
CVE-2021-26386
|
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call to the Stage 2 Bootloader potentially leading to corrupt memory and code execution.
|
Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
7.8
|
|
|
2022-05-12
|
CVE-2021-26368
|
Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.
|
Ryzen_3_2200u_firmware, Ryzen_3_2300u_firmware, Ryzen_3_3100_firmware, Ryzen_3_3300g_firmware, Ryzen_3_3300x_firmware, Ryzen_3_5125c_firmware, Ryzen_3_5400u_firmware, Ryzen_3_5425c_firmware, Ryzen_3_5425u_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Ryzen_5_2500u_firmware, Ryzen_5_2600_firmware, Ryzen_5_2600h_firmware, Ryzen_5_2600x_firmware, Ryzen_5_3400g_firmware, Ryzen_5_3450g_firmware, Ryzen_5_3600_firmware, Ryzen_5_3600x_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_5_5600x_firmware, Ryzen_5_5625c_firmware, Ryzen_5_5625u_firmware, Ryzen_5_5700g_firmware, Ryzen_5_5700ge_firmware, Ryzen_7_2700_firmware, Ryzen_7_2700u_firmware, Ryzen_7_2700x_firmware, Ryzen_7_2800h_firmware, Ryzen_7_3700x_firmware, Ryzen_7_3800x_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_7_5825c_firmware, Ryzen_7_5825u_firmware, Ryzen_9_3900x_firmware, Ryzen_9_3950x_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware, Ryzen_threadripper_2920x_firmware, Ryzen_threadripper_2950x_firmware, Ryzen_threadripper_2970wx_firmware, Ryzen_threadripper_2990wx_firmware, Ryzen_threadripper_3960x_firmware, Ryzen_threadripper_3970x_firmware, Ryzen_threadripper_3990x_firmware, Ryzen_threadripper_pro_3945wx_firmware, Ryzen_threadripper_pro_3955wx_firmware, Ryzen_threadripper_pro_3975wx_firmware, Ryzen_threadripper_pro_3995wx_firmware, Ryzen_threadripper_pro_5945wx_firmware, Ryzen_threadripper_pro_5955wx_firmware, Ryzen_threadripper_pro_5965wx_firmware, Ryzen_threadripper_pro_5975wx_firmware, Ryzen_threadripper_pro_5995wx_firmware
|
4.4
|
|
|
2022-11-15
|
CVE-2022-29277
|
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton:...
|
Genoa_firmware, Hygon_1_firmware, Hygon_2_firmware, Hygon_3_firmware, Milan_firmware, Rome_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900x_firmware, Ryzen_5950x_firmware, Snowy_owl_r1000_firmware, Snowy_owl_r2000_firmware, Snowy_owl_v2000_firmware, Snowy_owl_v3000_firmware, Alder_lake_firmware, Bakerville_firmware, Cedar_island_firmware, Comet_lake\-S_firmware, Denverton_firmware, Eagle_stream_firmware, Grangeville_de_ns_firmware, Granville_de_firmware, Greenlow\-R_firmware, Greenlow_firmware, Idaville_firmware, Mehlow\-R_firmware, Mehlow_firmware, Purley\-R_firmware, Tatlow_firmware, Tiger_lake_h\/up3_firmware, Whiskey_lake_firmware, Whitley_firmware
|
8.8
|
|
|
2023-05-09
|
CVE-2021-46749
|
Insufficient bounds checking in ASP (AMD Secure
Processor) may allow for an out of bounds read in SMI (System Management
Interface) mailbox checksum calculation triggering a data abort, resulting in a
potential denial of service.
|
Athlon_gold_3150g_firmware, Athlon_gold_3150ge_firmware, Athlon_silver_3050ge_firmware, Ryzen_1200_\(Af\)_firmware, Ryzen_1600_\(Af\)_firmware, Ryzen_2200g_firmware, Ryzen_2200ge_firmware, Ryzen_2300x_firmware, Ryzen_2400g_firmware, Ryzen_2400ge_firmware, Ryzen_2500x_firmware, Ryzen_2600_firmware, Ryzen_2600e_firmware, Ryzen_2600x_firmware, Ryzen_2700_firmware, Ryzen_2700e_firmware, Ryzen_2700x_firmware, Ryzen_2920x_firmware, Ryzen_2950x_firmware, Ryzen_2970wx_firmware, Ryzen_2990wx_firmware, Ryzen_3100_firmware, Ryzen_3300x_firmware, Ryzen_3500_firmware, Ryzen_3500x_firmware, Ryzen_3600_firmware, Ryzen_3600x_firmware, Ryzen_3600xt_firmware, Ryzen_3800x_firmware, Ryzen_3800xt_firmware, Ryzen_3900_firmware, Ryzen_3900x_firmware, Ryzen_3900xt_firmware, Ryzen_3950x_firmware, Ryzen_5300g_firmware, Ryzen_5300ge_firmware, Ryzen_5500_firmware, Ryzen_5600_firmware, Ryzen_5600g_firmware, Ryzen_5600ge_firmware, Ryzen_5600x_firmware, Ryzen_5700g_firmware, Ryzen_5700ge_firmware, Ryzen_5700x_firmware, Ryzen_5800_firmware, Ryzen_5800x3d_firmware, Ryzen_5800x_firmware, Ryzen_5900_firmware, Ryzen_5900x_firmware, Ryzen_5945wx_firmware, Ryzen_5950x_firmware, Ryzen_5955wx_firmware, Ryzen_5965wx_firmware, Ryzen_5975wx_firmware, Ryzen_5995wx_firmware, Ryzen_pro_2100ge_firmware
|
7.5
|
|
|