CVE-2021-26382
https://notcve.org/view.php?id=CVE-2021-26382
An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service. Un atacante privilegiado de cuenta root puede cargar cualquier imagen de firmware legítimamente firmada en el coprocesador de audio (ACP), independientemente de que la respectiva clave de firma sea declarada como usable para autenticar una imagen de firmware ACP, resultando potencialmente en una denegación de servicio • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 •
CVE-2022-23825 – hw: cpu: AMD: Branch Type Confusion (non-retbleed)
https://notcve.org/view.php?id=CVE-2022-23825
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure. Los alias en el predictor de bifurcación pueden causar que algunos procesadores AMD predigan el tipo de bifurcación incorrecto, conllevando a una divulgación de información A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure. • http://www.openwall.com/lists/oss-security/2022/11/08/1 http://www.openwall.com/lists/oss-security/2022/11/10/2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K https://lists.fedoraproject.org/archives/list • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2022-29900 – hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
https://notcve.org/view.php?id=CVE-2022-29900
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. Las predicciones de bifurcación mal entrenadas para las instrucciones de retorno pueden permitir la ejecución arbitraria de código especulativo bajo ciertas condiciones dependientes de la microarquitectura A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. • https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM https://security.gentoo.org/glsa/202402-07 https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037 https://www.debian.org/security/2022/dsa-5207 https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability https://access.redhat.com/security/cve/CVE-2022-29900 https • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •
CVE-2022-23823
https://notcve.org/view.php?id=CVE-2022-23823
A potential vulnerability in some AMD processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure. Una vulnerabilidad potencial en algunos procesadores AMD que usan el escalado de frecuencia puede permitir a un atacante autenticado ejecutar un ataque de tiempo para permitir potencialmente la divulgación de información • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1038 • CWE-203: Observable Discrepancy •
CVE-2021-26363
https://notcve.org/view.php?id=CVE-2021-26363
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure. Una UApp o ABL maliciosa o comprometida podría potencialmente cambiar el valor que el ASP usa para su DRAM reservada, a uno fuera del área cercada, conllevando potencialmente a una exposición de datos • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 •