Client Vulnerabilities – May 2023

Bulletin ID: AMD-SB-4001
Potential Impact: Varies by CVE, see descriptions below
Severity: Varies by CVE, see descriptions below

Summary

Potential vulnerabilities in AMD Secure Processor (ASP), AMD System Management Unit (SMU), and other platform components were discovered, and mitigations are being provided in AGESA™ PI software packages. 

Affected Products

AMD Athlon™ Processors, Ryzen™ Processors, Threadripper™ Processors

CVE Details

Refer to Glossary for explanation of terms

CVE

Severity

CVE Description

CVE-2020-12930 High Improper parameters handling in AMD Platform Security Processor (PSP) drivers may allow a privileged attacker to elevate their privileges.
CVE-2020-12931 High Improper parameters handling in the AMD Platform Security Processor (PSP) kernel may allow a privileged attacker to elevate their privileges
CVE-2021-26354

Medium

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.

CVE-2021-26371

Medium

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

CVE-2021-26391

Medium

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

CVE-2021-26392

Medium

 

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write allowing an attacker with privileges to gain code execution of the secure OS/kernel by loading a malicious TA.

CVE-2021-46760

Medium

A malicious or compromised UApp or ABL can send a malformed system call to the bootloader, which may result in an out-of-bounds memory access that may potentially lead to an attacker leaking sensitive information or achieving code execution.

CVE-2021-46773

Medium

Insufficient input validation in ABL may enable a privileged attacker to corrupt ASP memory, potentially resulting in a loss of integrity or code execution.

CVE-2021-46756

Medium

Insufficient validation of inputs in SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious Uapp or ABL to send malformed or invalid syscall to the bootloader resulting in a potential denial of service and loss of integrity.

CVE-2021-46753

Medium

Failure to validate the length fields of the ASP (AMD Secure Processor) sensor fusion hub headers may allow an attacker with a malicious Uapp or ABL to map the ASP sensor fusion hub region and overwrite data structures leading to a potential loss of confidentiality and integrity.

CVE-2021-46754

Medium

Insufficient input validation in the ASP (AMD Secure Processor) bootloader may allow an attacker with a compromised Uapp or ABL to coerce the bootloader into exposing sensitive information to the SMU (System Management Unit) resulting in a potential loss of confidentiality and integrity.

CVE-2021-26365

Medium

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

CVE-2021-26356

Medium

A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.

CVE-2021-26393

Medium

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker-controlled data resulting in a loss of confidentiality.

CVE-2021-26406

Medium

Insufficient validation in parsing Owner's Certificate Authority (OCA) certificates in SEV (AMD Secure Encrypted Virtualization) and SEV-ES user application can lead to a host crash potentially resulting in denial of service.

CVE-2021-46749

Medium

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

CVE-2021-46755

Medium

Failure to unmap certain SysHub mappings in error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious bootloader to exhaust the SysHub resources resulting in a potential denial of service.

CVE-2021-46792

Medium

Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial of service.

CVE-2021-46794 Medium

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

CVE-2021-46765 Low

Insufficient input validation in ASP may allow an attacker with a compromised SMM to induce out-of-bounds memory reads within the ASP, potentially leading to a denial of service.

CVE-2021-46759 Low

Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.

 

Mitigation

The AGESA™ versions listed below have been released to the Original Equipment Manufacturers (OEM) to help mitigate these issues. Please refer to your OEM for the BIOS update specific to your product.

 

DESKTOP

CVE

AMD Ryzen™ 2000 Series Desktop Processors
“Raven Ridge” AM4

AMD Ryzen™ 2000 Series Desktop Processors
“Pinnacle Ridge”

AMD Ryzen™ 3000 Series Desktop Processors
“Matisse” AM4

AMD Ryzen™ 5000 Series Desktop Processors
“Vermeer” AM4

AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics
“Cezanne” AM4

Minimum version to mitigate all listed CVEs

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PinnaclePI-AM4 1.0.0.C
ComboAM4PI 1.0.0.8
ComboAM4v2 PI 1.2.0.4

ComboAM4PI 1.0.0.9
ComboAM4 V2 PI 1.2.0.8

ComboAM4 V2 PI 1.2.0.8

ComboAM4v2 PI 1.2.0.8

CVE-2020-12930 Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8 N/A ComboAM4PI 1.0.0.9
ComboAM4 V2 PI 1.2.0.8
ComboAM4 V2 PI 1.2.0.8 ComboAM4v2 PI 1.2.0.4
CVE-2020-12931 Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8 N/A ComboAM4PI 1.0.0.8 
ComboAM4 V2 PI 1.2.0.6
ComboAM4 V2 PI 1.2.0.6 ComboAM4v2 PI 1.2.0.4

CVE-2021-26354

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4 V2 PI 1.2.0.6

ComboAM4PI 1.0.0.8
ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6

ComboAM4v2 PI 1.2.0.5

CVE-2021-26356

N/A

N/A

ComboAM4 V2 PI 1.2.0.6
ComboAM4PI 1.0.0.8

ComboAM4 V2 PI 1.2.0.6

N/A

CVE-2021-26365

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-26371

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

N/A

ComboAM4PI 1.0.0.8
ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6

N/A

CVE-2021-26391

N/A

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-26392

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

ComboAM4PI 1.0.0.9
ComboAM4 V2 PI 1.2.0.8

ComboAM4 V2 PI 1.2.0.8

ComboAM4v2 PI 1.2.0.6

CVE-2021-26393

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.6

CVE-2021-26406

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6
ComboAM4PI 1.0.0.8

ComboAM4 V2 PI 1.2.0.6
(2022-01-07)

N/A

CVE-2021-46749

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

ComboAM4PI 1.0.0.9
ComboAM4 V2 PI 1.2.0.8

ComboAM4 V2 PI 1.2.0.8

ComboAM4v2 PI 1.2.0.5

CVE-2021-46753

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-46754

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-46755

N/A

N/A

ComboAM4PI 1.0.0.8
ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6

ComboAM4v2 PI 1.2.0.5

CVE-2021-46756

Raven-FP5-AM4 1.1.0.E PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4 V2 PI 1.2.0.6

ComboAM4PI 1.0.0.8
ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6

ComboAM4v2 PI 1.2.0.5

CVE-2021-46759

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-46760

N/A

N/A

N/A

N/A

N/A

CVE-2021-46765

N/A

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.8

CVE-2021-46773

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C

PinnaclePI-AM4 1.0.0.C

ComboAM4PI 1.0.0.8
ComboAM4 V2 PI 1.2.0.6

ComboAM4 V2 PI 1.2.0.6

ComboAM4v2 PI 1.2.0.6

CVE-2021-46792

Raven-FP5-AM4 1.0.0.9
PinnaclePI-AM4 1.0.0.7

N/A

N/A

N/A

ComboAM4v2 PI 1.2.0.5

CVE-2021-46794

Raven-FP5-AM4 1.1.0.F PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

N/A

ComboAM4PI 1.0.0.9
ComboAM4 V2 PI 1.2.0.8

ComboAM4 V2 PI 1.2.0.8

ComboAM4v2 PI 1.2.0.5

 

HIGH END DESKTOP

CVE

2nd Gen AMD Ryzen™ Threadripper™ Processors
“Colfax”

3rd Gen AMD Ryzen™ Threadripper™ Processors
“Castle Peak” HEDT

Minimum version to mitigate all listed CVEs

SummitPI-SP3r2 1.1.0.5

CastlePeakPI-SP3r3 1.0.0.7

CVE-2020-12930

N/A CastlePeakPI-SP3r3 1.0.0.7

CVE-2020-12931

N/A CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-26354

SummitPI-SP3r2 1.1.0.5

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-26356

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-26365

N/A

N/A

CVE-2021-26371

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-26391

N/A

N/A

CVE-2021-26392

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-26393

N/A

N/A

CVE-2021-26406

SummitPI-SP3r2 1.1.0.5

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46749

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46753

N/A

N/A

CVE-2021-46754

N/A

N/A

CVE-2021-46755

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46756

SummitPI-SP3r2 1.1.0.5

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46759

N/A

N/A

CVE-2021-46760

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46765

N/A

N/A

CVE-2021-46773

N/A

CastlePeakPI-SP3r3 1.0.0.7

CVE-2021-46792

N/A

N/A

CVE-2021-46794

N/A

CastlePeakPI-SP3r3 1.0.0.7

 

WORKSTATION

CVE

AMD Ryzen™ Threadripper™ PRO Processors
“Castle Peak” WS

AMD Ryzen™ Threadripper™ PRO Processors
“Chagall” WS

Minimum version to mitigate all listed CVEs

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

CVE-2020-12930 CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2
ChagallWSPI-sWRX8 1.0.0.2
CVE-2020-12931 CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2
ChagallWSPI-sWRX8 1.0.0.2

CVE-2021-26354

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.0

CVE-2021-26356

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.1

CVE-2021-26365

N/A

N/A

CVE-2021-26371

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

CVE-2021-26391

N/A

N/A

CVE-2021-26392

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

CVE-2021-26393

N/A

N/A

CVE-2021-26406

CastlePeakWSPI-sWRX8 1.0.0.9
N/A - ChagallWSPI-sWRX8

N/A

CVE-2021-46749

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

CVE-2021-46753

N/A

N/A

CVE-2021-46754

N/A

N/A

CVE-2021-46755

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

CVE-2021-46756

 

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

N/A

CVE-2021-46759

N/A

N/A

CVE-2021-46760

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

N/A

CVE-2021-46765

N/A

N/A

CVE-2021-46773

CastlePeakWSPI-sWRX8 1.0.0.9

ChagallWSPI-sWRX8 1.0.0.0

CVE-2021-46792

N/A

N/A

CVE-2021-46794

CastlePeakWSPI-sWRX8 1.0.0.9
ChagallWSPI-sWRX8 1.0.0.2

ChagallWSPI-sWRX8 1.0.0.2

 

MOBILE - AMD Athlon™ Series

CVE

AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
“Dali”/”Dali” ULP

AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
“Pollock”

Minimum version to mitigate all listed CVEs

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2020-12930

PicassoPI-FP5 1.0.0.E PollockPI-FT5 1.0.0.4

CVE-2020-12931

PicassoPI-FP5 1.0.0.E PollockPI-FT5 1.0.0.4

CVE-2021-26354

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.3

CVE-2021-26356

N/A

N/A

CVE-2021-26365

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.3

CVE-2021-26371

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.3

CVE-2021-26391

N/A

N/A

CVE-2021-26392

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2021-26393

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.4

CVE-2021-26406

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.3

CVE-2021-46749

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2021-46753

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2021-46754

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2021-46755

N/A

N/A

CVE-2021-46756

PicassoPI-FP5 1.0.0.D

PollockPI-FT5 1.0.0.3

CVE-2021-46759

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

CVE-2021-46760

N/A

N/A

CVE-2021-46765

N/A

N/A

CVE-2021-46773

N/A

N/A

CVE-2021-46792

PicassoPI-FP5 1.0.0.4

N/A

CVE-2021-46794

PicassoPI-FP5 1.0.0.E

PollockPI-FT5 1.0.0.4

 

MOBILE - AMD Ryzen™ Series

CVE

AMD Ryzen™ 2000 Series Mobile Processors
“Raven Ridge” FP5

AMD Ryzen™ 3000 Series Mobile Processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics
“Picasso”

AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics
“Renoir” FP6

AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics
“Lucienne”

AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics
“Cezanne”

AMD Ryzen™ 6000 Series Mobile Processors
"Rembrandt"

Minimum version to mitigate all listed CVEs

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.9
ComboAM4v2 PI 1.2.0.8

CezannePI-FP6 1.0.0.B

CezannePI-FP6 1.0.0.B

RembrandtPI-FP7_1.0.0.5

CVE-2020-12930 Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8
PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8 RenoirPI-FP6 1.0.0.7
ComboAM4v2 PI 1.2.0.4
CezannePI-FP6 1.0.0.4 CezannePI-FP6 1.0.0.4 N/A
CVE-2020-12931 Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8
PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8 RenoirPI-FP6 1.0.0.7
ComboAM4v2 PI 1.2.0.4
CezannePI-FP6 1.0.0.4 CezannePI-FP6 1.0.0.4 N/A

CVE-2021-26354

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8

CezannePI-FP6 1.0.0.8

N/A

CVE-2021-26356

N/A

N/A

N/A

N/A

N/A

N/A

CVE-2021-26365

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8 CezannePI-FP6 1.0.0.8 RMB 1.0.0.4

CVE-2021-26371

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

N/A

N/A

N/A

N/A

CVE-2021-26391

N/A

N/A

RenoirPI-FP6 1.0.0.7
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.6 CezannePI-FP6 1.0.0.6

N/A

CVE-2021-26392

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6

1.0.0.9

CezannePI-FP6 1.0.0.9

N/A

CVE-2021-26393

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6

1.0.0.9

CezannePI-FP6 1.0.0.9

N/A

CVE-2021-26406

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

N/A

N/A

N/A

N/A

CVE-2021-46749

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8 CezannePI-FP6 1.0.0.8

N/A

CVE-2021-46753

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8 CezannePI-FP6 1.0.0.8

RembrandtPI-FP7_1.0.0.5

CVE-2021-46754

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.7
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.6

CezannePI-FP6 1.0.0.6

N/A

CVE-2021-46755

N/A

N/A

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8

CezannePI-FP6 1.0.0.8

N/A

CVE-2021-46756

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C
ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6C

PicassoPI-FP5 1.0.0.D ComboAM4PI 1.0.0.8 ComboAM4v2 PI 1.2.0.6 C

RenoirPI-FP6 1.0.0.7
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.6

CezannePI-FP6 1.0.0.6

N/A

CVE-2021-46759

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.8
ComboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.8

CezannePI-FP6 1.0.0.8

N/A

CVE-2021-46760

N/A

N/A

N/A

N/A

N/A

N/A

CVE-2021-46765

N/A

N/A

RenoirPI-FP6 1.0.0.9
ComboAM4v2 PI 1.2.0.8

CezannePI-FP6 1.0.0.B

CezannePI-FP6 1.0.0.B

RembrandtPI-FP7_1.0.0.5

CVE-2021-46773

Raven-FP5-AM4 1.1.0.E
PinnaclePI-AM4 1.0.0.C

N/A

RenoirPI-FP6 1.0.0.8 ComboAM4v2 PI 1.2.0.6

CezannePI-FP6 1.0.0.8

CezannePI-FP6 1.0.0.8

N/A

CVE-2021-46792

Raven-FP5-AM4 1.0.0.9
PinnaclePI-AM4 1.0.0.7

Picasso PI-FP5 1.0.0.4

RenoirPI-FP6 1.0.0.7 omboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.6

CezannePI-FP6 1.0.0.6

N/A

CVE-2021-46794

Raven-FP5-AM4 1.1.0.F
PinnaclePI-AM4 1.0.0.D ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

PicassoPI-FP5 1.0.0.E ComboAM4PI 1.0.0.9 ComboAM4v2 PI 1.2.0.8

RenoirPI-FP6 1.0.0.7 omboAM4v2 PI 1.2.0.5

CezannePI-FP6 1.0.0.6

CezannePI-FP6 1.0.0.6

N/A

Acknowledgement

AMD thanks the following for reporting these issues and engaging in coordinated vulnerability disclosure:

  • Mahdi Braik of Apple Media Products RedTeam: CVE-2020-12930, CVE-2020-12931, CVE-2021-26391, CVE-2021-26392, CVE-2021-26393
  • Internally reported:  CVE-2021-26354, CVE-2021-26371, CVE-2021-46760, CVE-2021-46773,CVE-2021-46756, CVE-2021-46753, CVE-2021-46754, CVE-2021-26365, CVE-2021-26356, CVE-2021-26406, CVE-2021-46749, CVE-2021-46755, CVE-2021-46792, CVE-2021-46794, CVE-2021-46765, CVE-2021-46759

 

Revisions

Revision Date Description
8/25/2023 Added: CVE-2020-12930, CVE-2020-12931
5/9/2023 Initial publication 

 

DISCLAIMER

The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.

AMD, the AMD Arrow logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.

© 2023 Advanced Micro Devices, Inc. All rights reserved.