Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 7c606a8

Browse files
committed
"-Synchronized-Data."
1 parent 9733c32 commit 7c606a8

18 files changed

+509
-159
lines changed

2020/12xxx/CVE-2020-12946.json

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
4-
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
55
"ID": "CVE-2020-12946",
66
"STATE": "PUBLIC"
77
},
@@ -12,23 +12,23 @@
1212
"product": {
1313
"product_data": [
1414
{
15-
"product_name": "2nd Gen AMD EPYC\u2122",
15+
"product_name": "Ryzen\u2122 Series ",
1616
"version": {
1717
"version_data": [
1818
{
19-
"version_affected": "<",
20-
"version_value": "RomePI-SP3_1.0.0.C"
19+
"version_affected": "=",
20+
"version_value": "various"
2121
}
2222
]
2323
}
2424
},
2525
{
26-
"product_name": "3rd Gen AMD EPYC\u2122",
26+
"product_name": " Athlon\u2122 Series ",
2727
"version": {
2828
"version_data": [
2929
{
30-
"version_affected": "<",
31-
"version_value": "MilanPI-SP3_1.0.0.4"
30+
"version_affected": "=",
31+
"version_value": "various"
3232
}
3333
]
3434
}
@@ -47,7 +47,7 @@
4747
"description_data": [
4848
{
4949
"lang": "eng",
50-
"value": "Insufficient input validation in PSP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service."
50+
"value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service."
5151
}
5252
]
5353
},
@@ -60,7 +60,7 @@
6060
"description": [
6161
{
6262
"lang": "eng",
63-
"value": "CWE-20 Improper Input Validation"
63+
"value": "tbd"
6464
}
6565
]
6666
}
@@ -70,13 +70,13 @@
7070
"reference_data": [
7171
{
7272
"refsource": "MISC",
73-
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
74-
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
7575
}
7676
]
7777
},
7878
"source": {
79-
"advisory": "AMD-SB-1021",
79+
"advisory": "AMD-SB-1027 ",
8080
"discovery": "UNKNOWN"
8181
}
8282
}

2020/12xxx/CVE-2020-12951.json

Lines changed: 12 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
4-
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
55
"ID": "CVE-2020-12951",
66
"STATE": "PUBLIC"
77
},
@@ -12,34 +12,23 @@
1212
"product": {
1313
"product_data": [
1414
{
15-
"product_name": "1st Gen AMD EPYC\u2122",
15+
"product_name": "Ryzen\u2122 Series ",
1616
"version": {
1717
"version_data": [
1818
{
19-
"version_affected": "<",
20-
"version_value": "NaplesPI-SP3_1.0.0.G"
19+
"version_affected": "=",
20+
"version_value": "various"
2121
}
2222
]
2323
}
2424
},
2525
{
26-
"product_name": "2nd Gen AMD EPYC\u2122",
26+
"product_name": " Athlon\u2122 Series ",
2727
"version": {
2828
"version_data": [
2929
{
30-
"version_affected": "<",
31-
"version_value": "RomePI-SP3_1.0.0.C"
32-
}
33-
]
34-
}
35-
},
36-
{
37-
"product_name": "3rd Gen AMD EPYC\u2122",
38-
"version": {
39-
"version_data": [
40-
{
41-
"version_affected": "<",
42-
"version_value": "MilanPI-SP3_1.0.0.4"
30+
"version_affected": "=",
31+
"version_value": "various"
4332
}
4433
]
4534
}
@@ -58,7 +47,7 @@
5847
"description_data": [
5948
{
6049
"lang": "eng",
61-
"value": "Race condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations."
50+
"value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations."
6251
}
6352
]
6453
},
@@ -71,7 +60,7 @@
7160
"description": [
7261
{
7362
"lang": "eng",
74-
"value": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)"
63+
"value": "tbd"
7564
}
7665
]
7766
}
@@ -81,13 +70,13 @@
8170
"reference_data": [
8271
{
8372
"refsource": "MISC",
84-
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
85-
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
8675
}
8776
]
8877
},
8978
"source": {
90-
"advisory": "AMD-SB-1021",
79+
"advisory": "AMD-SB-1027 ",
9180
"discovery": "UNKNOWN"
9281
}
9382
}

2021/26xxx/CVE-2021-26335.json

Lines changed: 12 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
4-
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
55
"ID": "CVE-2021-26335",
66
"STATE": "PUBLIC"
77
},
@@ -12,34 +12,23 @@
1212
"product": {
1313
"product_data": [
1414
{
15-
"product_name": "1st Gen AMD EPYC\u2122",
15+
"product_name": "Ryzen\u2122 Series ",
1616
"version": {
1717
"version_data": [
1818
{
19-
"version_affected": "<",
20-
"version_value": "NaplesPI-SP3_1.0.0.G"
19+
"version_affected": "=",
20+
"version_value": "various"
2121
}
2222
]
2323
}
2424
},
2525
{
26-
"product_name": "2nd Gen AMD EPYC\u2122",
26+
"product_name": " Athlon\u2122 Series ",
2727
"version": {
2828
"version_data": [
2929
{
30-
"version_affected": "<",
31-
"version_value": "RomePI-SP3_1.0.0.C"
32-
}
33-
]
34-
}
35-
},
36-
{
37-
"product_name": "3rd Gen AMD EPYC\u2122",
38-
"version": {
39-
"version_data": [
40-
{
41-
"version_affected": "<",
42-
"version_value": "MilanPI-SP3_1.0.0.4"
30+
"version_affected": "=",
31+
"version_value": "various"
4332
}
4433
]
4534
}
@@ -58,7 +47,7 @@
5847
"description_data": [
5948
{
6049
"lang": "eng",
61-
"value": "Improper input and range checking in the Platform Security Processor (PSP) boot loader image header may allow for an attacker to use attack-controlled values prior to signature validation potentially resulting in arbitrary code execution."
50+
"value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution."
6251
}
6352
]
6453
},
@@ -71,7 +60,7 @@
7160
"description": [
7261
{
7362
"lang": "eng",
74-
"value": "CWE-20 Improper Input Validation"
63+
"value": "tbd"
7564
}
7665
]
7766
}
@@ -81,13 +70,13 @@
8170
"reference_data": [
8271
{
8372
"refsource": "MISC",
84-
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
85-
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
8675
}
8776
]
8877
},
8978
"source": {
90-
"advisory": "AMD-SB-1021",
79+
"advisory": "AMD-SB-1027 ",
9180
"discovery": "UNKNOWN"
9281
}
9382
}

2021/26xxx/CVE-2021-26336.json

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
4-
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
55
"ID": "CVE-2021-26336",
66
"STATE": "PUBLIC"
77
},
@@ -12,23 +12,23 @@
1212
"product": {
1313
"product_data": [
1414
{
15-
"product_name": "2nd Gen AMD EPYC\u2122",
15+
"product_name": "Ryzen\u2122 Series ",
1616
"version": {
1717
"version_data": [
1818
{
19-
"version_affected": "<",
20-
"version_value": "RomePI-SP3_1.0.0.C"
19+
"version_affected": "=",
20+
"version_value": "various"
2121
}
2222
]
2323
}
2424
},
2525
{
26-
"product_name": "3rd Gen AMD EPYC\u2122",
26+
"product_name": " Athlon\u2122 Series ",
2727
"version": {
2828
"version_data": [
2929
{
30-
"version_affected": "<",
31-
"version_value": "MilanPI-SP3_1.0.0.4"
30+
"version_affected": "=",
31+
"version_value": "various"
3232
}
3333
]
3434
}
@@ -60,7 +60,7 @@
6060
"description": [
6161
{
6262
"lang": "eng",
63-
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
63+
"value": "tbd"
6464
}
6565
]
6666
}
@@ -70,13 +70,13 @@
7070
"reference_data": [
7171
{
7272
"refsource": "MISC",
73-
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
74-
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
7575
}
7676
]
7777
},
7878
"source": {
79-
"advisory": "AMD-SB-1021",
79+
"advisory": "AMD-SB-1027 ",
8080
"discovery": "UNKNOWN"
8181
}
8282
}

2021/26xxx/CVE-2021-26337.json

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
4-
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
4+
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
55
"ID": "CVE-2021-26337",
66
"STATE": "PUBLIC"
77
},
@@ -12,23 +12,23 @@
1212
"product": {
1313
"product_data": [
1414
{
15-
"product_name": "2nd Gen AMD EPYC\u2122",
15+
"product_name": "Ryzen\u2122 Series ",
1616
"version": {
1717
"version_data": [
1818
{
19-
"version_affected": "<",
20-
"version_value": "RomePI-SP3_1.0.0.C"
19+
"version_affected": "=",
20+
"version_value": "various"
2121
}
2222
]
2323
}
2424
},
2525
{
26-
"product_name": "3rd Gen AMD EPYC\u2122",
26+
"product_name": " Athlon\u2122 Series ",
2727
"version": {
2828
"version_data": [
2929
{
30-
"version_affected": "<",
31-
"version_value": "MilanPI-SP3_1.0.0.4"
30+
"version_affected": "=",
31+
"version_value": "various"
3232
}
3333
]
3434
}
@@ -60,7 +60,7 @@
6060
"description": [
6161
{
6262
"lang": "eng",
63-
"value": "CWE-20 Improper Input Validation"
63+
"value": "tbd"
6464
}
6565
]
6666
}
@@ -70,13 +70,13 @@
7070
"reference_data": [
7171
{
7272
"refsource": "MISC",
73-
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
74-
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
73+
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
74+
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
7575
}
7676
]
7777
},
7878
"source": {
79-
"advisory": "AMD-SB-1021",
79+
"advisory": "AMD-SB-1027 ",
8080
"discovery": "UNKNOWN"
8181
}
8282
}

0 commit comments

Comments
 (0)