CVE-2021-46768

Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:romepi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:romepi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:34

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 - Vendor Advisory () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 - Vendor Advisory
Summary
  • (es) Una validación de entrada insuficiente en el firmware SEV puede permitir que un atacante realice lecturas de memoria fuera de los límites dentro del cargador de arranque ASP, lo que podría provocar una denegación de servicio.

08 Aug 2023, 14:21

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-11 08:15

Updated : 2024-11-21 06:34


NVD link : CVE-2021-46768

Mitre link : CVE-2021-46768

CVE.ORG link : CVE-2021-46768


JSON object : View

Products Affected

amd

  • romepi
  • milanpi_firmware
  • romepi_firmware
  • milanpi
CWE
CWE-125

Out-of-bounds Read