Home

Description

Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.

PUBLISHED Reserved 2021-01-29 | Published 2026-02-10 | Updated 2026-02-12 | Assigner AMD




LOW: 1.8CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-822 Untrusted Pointer Dereference

Product status

Default status
affected

ComboAM4v2 PI 1.2.0.5+ iGPU Driver Update
unaffected

Default status
affected

RenoirPI-FP6 1.0.0.8
unaffected

Default status
affected

CezannePI-FP6 1.0.0.8
unaffected

Default status
affected

CezannePI-FP6 1.0.0.8
unaffected

Default status
affected

ComboAM4v2 PI 1.2.0.5
unaffected

Default status
affected

EmbeddedPI-FP5_1.2.0.A
unaffected

Default status
affected

EmbeddedR2KPI-FP5_1.0.0.2
unaffected

Default status
affected

EmbeddedPI-FP5_1.2.0.A
unaffected

Default status
affected

EmbeddedPI-FP5_1.2.0.A
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.6
unaffected

Default status
affected

EmbeddedPI-FP7r2_1.0.0.0
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10), Radeon Software For Linux (25.10.1)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10), Radeon Software For Linux (25.10.1)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10), Radeon Software For Linux (25.10.1)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10), Radeon Software For Linux (25.10.1)
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-6024.html

www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html

cve.org (CVE-2021-26410)

nvd.nist.gov (CVE-2021-26410)

Download JSON