An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service.
[
{
"product": "Ryzenβ’ Series ",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"product": " Athlonβ’ Series ",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
]