Amd

Radeon Pro V620

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 15.05.2026 02:59:46
  • Zuletzt bearbeitet 15.05.2026 14:10:17

A race condition in the MxGPU-Virtualization driver’s ioctl path caused by concurrent unsynchronized access to the global variable amdgv_cmd in an unlocked ioctl handler could be exploited by an attacker to trigger a heap-based buffer overflow, poten...

  • EPSS 0.01%
  • Veröffentlicht 15.05.2026 02:48:10
  • Zuletzt bearbeitet 15.05.2026 14:10:17

Improper validation in Power Management Firmware (PMFW) may allow an attacker with privileges to pass malformed workload arguments when exporting table data from SMU to DRAM potentially resulting in a loss of confidentiality and/or availability.

  • EPSS 0.04%
  • Veröffentlicht 15.05.2026 02:44:54
  • Zuletzt bearbeitet 15.05.2026 14:10:17

Out of bounds write in AMD AMDGV_CMD_GET_DIAG_DATA ioctl handler could allow a local user to escalate privileges via remote code execution.

  • EPSS 0.03%
  • Veröffentlicht 15.05.2026 02:42:33
  • Zuletzt bearbeitet 15.05.2026 14:10:17

Insufficient parameter sanitization in TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_SRIOV_CHECK_TA_COMPAT to cause incorrect shared memory mapping, potentially resulting in unexpected behavior.

  • EPSS 0.01%
  • Veröffentlicht 15.05.2026 02:41:56
  • Zuletzt bearbeitet 15.05.2026 14:10:17

Insufficient parameter sanitization in AMD Secure Processor (ASP) TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_LOAD_GFX_IP_FW SR-IOV command to cause out-of-bounds read, potentially resulting in SOC Driver memory content...

  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 14:33:19
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code execution

  • EPSS 0.02%
  • Veröffentlicht 06.09.2025 16:26:58
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Improper validation of an array index in the AMD graphics driver software could allow an attacker to pass malformed arguments to the dynamic power management (DPM) functions resulting in an out of bounds read and loss of availability.

  • EPSS 0.03%
  • Veröffentlicht 06.09.2025 16:13:36
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Improper handling of insufficiency privileges in the ASP could allow a privileged attacker to modify Translation Map Registers (TMRs) potentially resulting in loss of confidentiality or integrity.

  • EPSS 0.04%
  • Veröffentlicht 12.02.2025 00:15:07
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Improper access control in the ASP could allow a privileged attacker to perform an out-of-bounds write to a memory location not controlled by the attacker, potentially leading to loss of confidentiality, integrity, or availability.