4.7

CVE-2021-26350

A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AmdEpyc 7232p Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7232p Version-
AmdEpyc 7302p Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7302p Version-
AmdEpyc 7402p Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7402p Version-
AmdEpyc 7502p Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7502p Version-
AmdEpyc 7702p Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7702p Version-
AmdEpyc 7252 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7252 Version-
AmdEpyc 7262 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7262 Version-
AmdEpyc 7272 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7272 Version-
AmdEpyc 7282 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7282 Version-
AmdEpyc 7302 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7302 Version-
AmdEpyc 7352 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7352 Version-
AmdEpyc 7402 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7402 Version-
AmdEpyc 7452 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7452 Version-
AmdEpyc 7502 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7502 Version-
AmdEpyc 7532 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7532 Version-
AmdEpyc 7542 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7542 Version-
AmdEpyc 7552 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7552 Version-
AmdEpyc 7642 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7642 Version-
AmdEpyc 7662 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7662 Version-
AmdEpyc 7702 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7702 Version-
AmdEpyc 7742 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7742 Version-
AmdEpyc 7f32 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7f32 Version-
AmdEpyc 7f52 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7f52 Version-
AmdEpyc 7f72 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7f72 Version-
AmdEpyc 7f32 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7f32 Version-
AmdEpyc 7f52 Firmware Version < romepi-sp3_1.0.0.d
   AmdEpyc 7f52 Version-
AmdEpyc 7313p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7313p Version-
AmdEpyc 7443p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7443p Version-
AmdEpyc 7543p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7543p Version-
AmdEpyc 7713p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7713p Version-
AmdEpyc 7773x Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7773x Version-
AmdEpyc 7763 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7763 Version-
AmdEpyc 7713 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7713 Version-
AmdEpyc 7663 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7663 Version-
AmdEpyc 7643 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7643 Version-
AmdEpyc 7573x Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7573x Version-
AmdEpyc 75f3 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 75f3 Version-
AmdEpyc 7543p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7543p Version-
AmdEpyc 7513 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7513 Version-
AmdEpyc 7473x Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7473x Version-
AmdEpyc 7453 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7453 Version-
AmdEpyc 74f3 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 74f3 Version-
AmdEpyc 7443p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7443p Version-
AmdEpyc 7413 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7413 Version-
AmdEpyc 73f3 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 73f3 Version-
AmdEpyc 7373x Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7373x Version-
AmdEpyc 7343 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7343 Version-
AmdEpyc 7313p Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 7313p Version-
AmdEpyc 72f3 Firmware Version < milanpi-sp3_1.0.0.7
   AmdEpyc 72f3 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.286
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.7 1 3.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:N/I:N/A:P
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.