Description
An integer overflow in the ASP could allow a privileged attacker to perform an out-of-bounds write, potentially resulting in loss of data integrity.
Reserved 2022-10-27 | Published 2025-02-11 | Updated 2025-02-12 | Assigner
AMDLOW: 2.3CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Problem types
CWE-190 Integer Overflow or Wraparound
Product status
Default status
affected
ComboAM4V2 1.2.0.A
unaffected
Default status
affected
ComboAM5 1.0.0.6
unaffected
Default status
affected
ComboAM4V2 1.2.0.A
unaffected
Default status
affected
ComboAM4V2 1.2.0.A
unaffected
Default status
affected
ComboAM5 1.0.0.6
unaffected
Default status
affected
RenoirPI-FP6 1.0.0.C
unaffected
Default status
affected
CezannePI-FP6 1.0.0.E
unaffected
Default status
affected
MendocinoPI-FT6 1.0.0.5
unaffected
Default status
affected
RembrandtPI-FP7 1.0.0.8
unaffected
Default status
affected
RembrandtPI-FP7 1.0.0.8
unaffected
Default status
affected
DragonRangeFL1 1.0.0.2b
unaffected
Default status
affected
EmbAM4PI 1.0.0.5
unaffected
Default status
affected
EmbeddedAM5PI 1.0.0.0
unaffected
Default status
affected
EmbeddedPI-FP6 1.0.0.8
unaffected
Default status
affected
EmbeddedPI-FP7r2 1.0.0.6
unaffected
References
www.amd.com/...es/product-security/bulletin/amd-sb-5004.html
www.amd.com/...es/product-security/bulletin/amd-sb-4008.html
cve.org (CVE-2023-20507)
nvd.nist.gov (CVE-2023-20507)
Download JSON