{"id":"CVE-2021-26372","details":"Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.","modified":"2026-03-14T10:49:24.328572Z","published":"2022-05-11T17:15:08.547Z","related":["SUSE-SU-2022:1751-1","SUSE-SU-2022:1840-1","SUSE-SU-2022:1846-1","SUSE-SU-2022:1847-1","SUSE-SU-2022:1923-1"],"references":[{"type":"ADVISORY","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"},{"type":"ADVISORY","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"romepi-sp3_1.0.0.d"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]},{"events":[{"introduced":"0"},{"fixed":"milanpi-sp3_1.0.0.7"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26372.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}