Home

Description

A TOCTOU (Time-Of-Check to Time-Of-Use) in the graphics interface may allow an attacker to load registers repeatedly creating a race condition potentially leading to a loss of integrity.

PUBLISHED Reserved 2022-01-21 | Published 2026-05-15 | Updated 2026-05-15 | Assigner AMD




LOW: 1.8CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

Product status

Default status
affected

PicassoPI-FP5 1.0.0.E
unaffected

Default status
affected

PicassoPI-FP5 1.0.0.E
unaffected

Default status
affected

ComboAM4v2 PI 1.2.0.8
unaffected

Default status
affected

EmbeddedPI-FP5_1.2.0.A
unaffected

Default status
affected

EmbeddedR2KPI-FP5_1.0.0.2
unaffected

Default status
affected

EmbeddedPI-FP5_1.2.0.A
unaffected

Default status
affected

120A
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q2 (25.10.10)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.5.1 (23.19.23.01 pre-RDNA)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.5.1 (23.19.23.01 pre-RDNA)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q2 (25.10.10)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q2 (25.10.10)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA)
unaffected

Default status
affected

ROCm 6.4.2
unaffected

Default status
affected

ROCm 6.4.2
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4017.html

www.amd.com/...es/product-security/bulletin/AMD-SB-6027.html

cve.org (CVE-2022-23826)

nvd.nist.gov (CVE-2022-23826)

Download JSON