First published: Tue Jan 10 2023(Updated: )
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Epyc 7003 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7003 | ||
Amd Epyc 72f3 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 72f3 | ||
Amd Epyc 7313 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7313 | ||
Amd Epyc 7313p Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7313p | ||
Amd Epyc 7343 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7343 | ||
Amd Epyc 7373x Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7373x | ||
Amd Epyc 73f3 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 73f3 | ||
Amd Epyc 7413 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7413 | ||
Amd Epyc 7443 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7443 | ||
Amd Epyc 7443p Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7443p | ||
Amd Epyc 7453 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7453 | ||
Amd Epyc 74f3 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 74f3 | ||
Amd Epyc 7513 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7513 | ||
Amd Epyc 7543 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7543 | ||
Amd Epyc 7543p Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7543p | ||
Amd Epyc 7573x Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7573x | ||
Amd Epyc 75f3 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 75f3 | ||
Amd Epyc 7643 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7643 | ||
Amd Epyc 7663 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7663 | ||
Amd Epyc 7713 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7713 | ||
Amd Epyc 7713p Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7713p | ||
Amd Epyc 7743 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7743 | ||
Amd Epyc 7763 Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7763 | ||
Amd Epyc 7773x Firmware | <milanpi-sp3_1.0.0.9 | |
Amd Epyc 7773x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-26396.
The title of the vulnerability is "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest."
The severity of CVE-2021-26396 is medium with a severity value of 4.4.
The affected software is Amd Epyc 7003 Firmware version milanpi-sp3_1.0.0.9.
To fix CVE-2021-26396, it is recommended to update to the latest version of Amd Epyc 7003 Firmware.