Amd

Radeon Software

50 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Published 08.08.2023 18:15:11
  • Last modified 21.11.2024 07:41:10

A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any m...

  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:17

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacke...

  • EPSS 0.03%
  • Published 09.11.2022 21:15:12
  • Last modified 01.05.2025 15:15:54

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:16

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.

  • EPSS 0.04%
  • Published 09.11.2022 21:15:11
  • Last modified 01.05.2025 15:15:54

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary ...

  • EPSS 0.1%
  • Published 09.11.2022 21:15:11
  • Last modified 21.11.2024 05:00:33

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

  • EPSS 0.1%
  • Published 09.11.2022 21:15:10
  • Last modified 21.11.2024 05:00:33

Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

  • EPSS 0.12%
  • Published 12.05.2022 19:15:48
  • Last modified 21.11.2024 05:56:12

A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.

  • EPSS 0.19%
  • Published 12.05.2022 19:15:48
  • Last modified 21.11.2024 05:56:05

Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.

  • EPSS 0.14%
  • Published 12.05.2022 18:16:53
  • Last modified 21.11.2024 05:56:13

A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.