Amd

Ryzen Threadripper 2990wx Firmware

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 09.11.2022 21:15:13
  • Zuletzt bearbeitet 21.11.2024 06:49:19

IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.

  • EPSS 0.13%
  • Veröffentlicht 10.08.2022 20:15:24
  • Zuletzt bearbeitet 21.11.2024 06:34:42

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues ...

  • EPSS 0.19%
  • Veröffentlicht 14.07.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:49:19

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

  • EPSS 1.41%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:55

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • EPSS 0.5%
  • Veröffentlicht 15.06.2022 20:15:17
  • Zuletzt bearbeitet 21.11.2024 06:49:19

A potential vulnerability in some AMD processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure.

  • EPSS 0.06%
  • Veröffentlicht 12.05.2022 19:15:48
  • Zuletzt bearbeitet 21.11.2024 05:56:13

Insufficient check of the process type in Trusted OS (TOS) may allow an attacker with privileges to enable a lesser privileged process to unmap memory owned by a higher privileged process resulting in a denial of service.

  • EPSS 0.19%
  • Veröffentlicht 12.05.2022 19:15:48
  • Zuletzt bearbeitet 21.11.2024 05:56:15

A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call to the Stage 2 Bootloader potentially leading to corrupt memory and code execution.

  • EPSS 0.19%
  • Veröffentlicht 12.05.2022 19:15:48
  • Zuletzt bearbeitet 21.11.2024 05:56:05

Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.

  • EPSS 0.14%
  • Veröffentlicht 12.05.2022 18:16:53
  • Zuletzt bearbeitet 21.11.2024 05:56:13

A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.

  • EPSS 0.13%
  • Veröffentlicht 12.05.2022 18:16:53
  • Zuletzt bearbeitet 21.11.2024 05:56:13

An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.