2024-02-13 17:14:09
AMD
PUBLISHED
Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams.