
CVE-2021-26361
https://notcve.org/view.php?id=CVE-2021-26361
12 May 2022 — A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure. Un atacante podría usar una aplicación de usuario (UApp) o un cargador de arranque AGESA (ABL) maliciosos o comprometidos para extraer memoria arbitraria del cargador de arranque de la fase 2 de ASP, conllevando potencialmente a una divulgación de información • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 •

CVE-2021-26362
https://notcve.org/view.php?id=CVE-2021-26362
12 May 2022 — A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability. Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para emitir una llamada al sistema malformada que resulte en el mapeo de registros confidenciales de System Management Network (SMN) conllevando a una pérdida de integridad y disponibilidad • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 •

CVE-2021-26366
https://notcve.org/view.php?id=CVE-2021-26366
12 May 2022 — An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity. Un atacante, que haya obtenido altos privilegios por algún otro tipo de vulnerabilidad, puede ser capaz de leer los datos de la ROM de arranque, resultando en una pérdida de la integridad del sistema • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 •

CVE-2021-26369
https://notcve.org/view.php?id=CVE-2021-26369
12 May 2022 — A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses. Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de límites • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2021-26341 – hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
https://notcve.org/view.php?id=CVE-2021-26341
11 Mar 2022 — Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage. Algunas CPUs de AMD pueden ejecutar transitoriamente más allá de las ramas directas no condicionales, lo que puede potencialmente resultar en un filtrado de datos A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernet... • http://www.openwall.com/lists/oss-security/2022/03/18/2 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-552: Files or Directories Accessible to External Parties •

CVE-2021-26401 – hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715
https://notcve.org/view.php?id=CVE-2021-26401
11 Mar 2022 — LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs. LFENCE/JMP (mitigación V2-2) puede no mitigar suficientemente CVE-2017-5715 en algunas CPUs AMD A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs. Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges th... • http://www.openwall.com/lists/oss-security/2022/03/18/2 •

CVE-2020-12965
https://notcve.org/view.php?id=CVE-2020-12965
04 Feb 2022 — When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage. Cuando se combinan con secuencias de software específicas, las CPUs de AMD pueden ejecutar transitoriamente cargas no canónicas y almacenar usando sólo los 48 bits de dirección inferiores, resultando potencialmente en un filtrado de datos • http://www.openwall.com/lists/oss-security/2023/12/05/3 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •