Описание
Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution.
A flaw was found in AmdPspP2CmboxV2 in the UEFI module. Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution.
Отчет
This issue occurs due to the lack of sufficient input buffer(s) validation within the AmdPspP2CmboxV2 UEFI module. Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information, please contact the binary content vendor.
Меры по смягчению последствий
Available mitigation requires updating the BIOS (updating firmware of CPU). The bug affects hardware (processors of the AMD EPYC™ family).
Ссылки на источники
Дополнительная информация
Статус:
EPSS
8.2 High
CVSS3
Связанные уязвимости
Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution.
Improper input validation within the AmdPspP2CmboxV2 driver may allow a privileged attacker to overwrite SMRAM, leading to arbitrary code execution.
Уязвимость драйвера AmdPspP2CmboxV2 микропрограммного обеспечения процессоров AMD, позволяющая нарушителю выполнить произвольный код
EPSS
8.2 High
CVSS3