CVE-2021-26391

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
01/05/2025

Description

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* 22.10.20 (excluding)
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* 22.q2 (excluding)
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* 22.5.2 (excluding)
cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*