Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | vendor advisory |