SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an
attacker with a malicious Uapp or ABL to send malformed or invalid syscall to
the bootloader resulting in a potential denial of service and loss of
integrity.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-33412 | Insufficient validation of inputs in SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious Uapp or ABL to send malformed or invalid syscall to the bootloader resulting in a potential denial of service and loss of integrity. |
Tue, 28 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-01-28T15:38:19.211Z
Reserved: 2022-03-31T16:50:27.868Z
Link: CVE-2021-46756
Updated: 2024-08-04T05:17:42.446Z
Status : Modified
Published: 2023-05-09T20:15:12.200
Modified: 2025-01-28T16:15:31.723
Link: CVE-2021-46756
No data.
OpenCVE Enrichment
No data.
EUVD