Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
[
{
"product": "Ryzenβ’ Series ",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"product": " Athlonβ’ Series ",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
]