Home

Description

Insufficient bounds checking in AMD TEE (Trusted Execution Environment) could allow an attacker with a compromised userspace to invoke a command with malformed arguments leading to out of bounds memory access, potentially resulting in loss of integrity or availability.

PUBLISHED Reserved 2021-01-29 | Published 2025-09-05 | Updated 2025-09-08 | Assigner AMD




HIGH: 7.9CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

Problem types

CWE-787 Out-of-bounds Write

Product status

Default status
affected

CezannePI-FP6 1.0.0.6
unaffected

Default status
affected

ComboAM4v2 PI 1.2.0.5
unaffected

Default status
affected

CezannePI-FP6 1.0.0.6
unaffected

Default status
affected

ComboAM4v2 PI 1.2.0.5
unaffected

Default status
affected

RenoirPI-FP6 1.0.0.7
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.6
unaffected

Default status
affected

AMD Software: Adrenalin Edition 23.2.1 (22.40.01.45)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 23.2.1 (22.40.01.45)
unaffected

Default status
affected

AMD Software: PRO Edition 23.Q1 (22.40.37.05)
unaffected

Default status
affected

AMD Software: PRO Edition 23.Q1 (22.40.37.05)
unaffected

Default status
affected

ROCm 6.4
unaffected

Default status
affected

ROCm 6.4
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html

www.amd.com/...es/product-security/bulletin/AMD-SB-6018.html

www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html

cve.org (CVE-2021-26383)

nvd.nist.gov (CVE-2021-26383)

Download JSON