Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure. | |
| Weaknesses | CWE-822 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-02-10T20:50:34.974Z
Reserved: 2021-01-29T21:24:26.172Z
Link: CVE-2021-26410
Updated: 2026-02-10T20:50:13.363Z
Status : Awaiting Analysis
Published: 2026-02-10T20:16:42.227
Modified: 2026-02-10T21:51:48.077
Link: CVE-2021-26410
No data.
OpenCVE Enrichment
No data.