Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code executionReferenceshttps://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.htmlhttps://www.amd.com/en/resources/product-security/bulletin/Emb-Auto.html