CVE-2021-26392
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
09/11/2022
Last modified:
16/09/2024
Description
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* | 22.10.20 (excluding) | |
| cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* | 22.q2 (excluding) | |
| cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* | 22.5.2 (excluding) | |
| cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



