Improper input validation in ARM® Trusted Firmware used in AMD’s Zynq™ UltraScale+™) MPSoC/RFSoC may allow a privileged attacker to perform out of bound reads, potentially resulting in data leakage and denial of service.
References
Link | Resource |
---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8002 | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
27 Nov 2024, 15:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-125 | |
References | () https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8002 - Broken Link | |
CPE | cpe:2.3:h:amd:zu15eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu5cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu4eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu3teg:-:*:*:*:*:*:*:* cpe:2.3:o:arm:trusted_firmware-a:*:*:*:*:*:*:*:* cpe:2.3:h:amd:zu63dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu11eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu7cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu47dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu4cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu43dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu9eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu19eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu6eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu46dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu1cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu17eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu42dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu67dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu29dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu64dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu2eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu7eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu3eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu25dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu48dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu27dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu9cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu21dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu6cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu3cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu5eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu39dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu28dr:-:*:*:*:*:*:*:* cpe:2.3:o:amd:trusted_firmware-a:*:*:*:*:*:*:*:* cpe:2.3:h:amd:zu2cg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu5ev:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu7ev:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu4ev:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu1eg:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu65dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu49dr:-:*:*:*:*:*:*:* cpe:2.3:h:amd:zu3tcg:-:*:*:*:*:*:*:* |
|
First Time |
Amd zu5cg
Amd Amd zu5eg Amd zu49dr Amd zu42dr Amd zu4eg Amd zu63dr Amd zu7cg Amd zu29dr Amd zu3eg Amd zu3cg Amd zu9eg Amd zu28dr Amd zu27dr Amd zu39dr Amd zu3teg Amd zu25dr Amd zu48dr Amd zu6eg Arm trusted Firmware-a Amd zu47dr Amd zu2eg Amd zu15eg Amd zu64dr Amd zu6cg Amd zu46dr Amd trusted Firmware-a Amd zu2cg Amd zu1eg Amd zu4cg Amd zu3tcg Amd zu67dr Amd zu7ev Amd zu19eg Amd zu17eg Amd zu43dr Amd zu1cg Amd zu11eg Amd zu7eg Amd zu9cg Arm Amd zu21dr Amd zu4ev Amd zu5ev Amd zu65dr |
13 Aug 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-13 17:15
Updated : 2024-11-27 15:55
NVD link : CVE-2023-31339
Mitre link : CVE-2023-31339
CVE.ORG link : CVE-2023-31339
JSON object : View
Products Affected
amd
- zu6cg
- zu25dr
- zu47dr
- zu3eg
- zu7ev
- zu1cg
- zu3cg
- zu39dr
- zu19eg
- zu63dr
- zu27dr
- zu4ev
- zu7cg
- zu48dr
- zu64dr
- zu4cg
- zu11eg
- zu3tcg
- zu28dr
- zu29dr
- zu5cg
- zu17eg
- zu5ev
- zu42dr
- zu4eg
- zu6eg
- zu15eg
- zu3teg
- zu1eg
- zu65dr
- zu5eg
- zu21dr
- zu9eg
- zu49dr
- zu2eg
- zu2cg
- zu7eg
- zu9cg
- zu43dr
- zu46dr
- trusted_firmware-a
- zu67dr
arm
- trusted_firmware-a