Home

Description

Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a trusted execution environment (TEE) driver, potentially leading to loss of confidentiality.

PUBLISHED Reserved 2023-04-27 | Published 2025-09-06 | Updated 2025-09-08 | Assigner AMD




LOW: 2.8CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-457 Use of Uninitialized Variable

Product status

Default status
affected

Cezanne-FP6_1.0.1.0
unaffected

Default status
affected

Cezanne-FP6_1.0.1.0
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.1.0.2
unaffected

Default status
affected

Renoir-FP6_ 1.0.0.D
unaffected

Default status
affected

Rembrandt-FP7_1.0.0.A
unaffected

Default status
affected

Cezanne-FP6_1.0.1.0
unaffected

Default status
affected

MendocinoPI-FT6_1.0.0.6
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.A
unaffected

Default status
affected

Embedded-PI_FP7r2 1009
unaffected

Default status
affected

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
unaffected

Default status
affected

AMD Software: PRO Edition 24.Q2 (24.10.20)
unaffected

Default status
affected

ROCm 6.4
unaffected

Default status
affected

ROCm 6.4
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html

www.amd.com/...es/product-security/bulletin/AMD-SB-6018.html

www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html

cve.org (CVE-2023-31326)

nvd.nist.gov (CVE-2023-31326)

Download JSON