Home
MEDIUM: 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:NDefault status
affected
AMD Software: Adrenalin Edition 25.12.1 (25.10.37.01)
unaffected
Default status
affected
AMD Software: Adrenalin Edition 25.11.1 (25.20.29.01)
unaffected
Default status
affected
AMD Software: PRO Edition 25.Q4 (25.10.37.01)
unaffected
Default status
affected
AMD Software: PRO Edition 25.Q3.1 (25.10.32)
unaffected
Default status
affected
ROCm 7.0
unaffected
Default status
affected
ROCm 7.0
unaffected
Default status
affected
ROCm 6.3.1
unaffected
Default status
affected
ROCm 6.3.1
unaffected
Default status
affected
ROCm 6.4.2
unaffected
Default status
affected
BKC 26 (ROCm 7.0.1)
unaffected
Default status
affected
Contact your AMD Customer Engineering representative
unaffected
Default status
affected
Contact your AMD Customer Engineering representative
unaffected
Default status
affected
Contact your AMD Customer Engineering representative
unaffected
Description
Insufficient parameter sanitization in AMD Secure Processor (ASP) TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_LOAD_GFX_IP_FW SR-IOV command to cause out-of-bounds read, potentially resulting in SOC Driver memory contents exposure or an exception
Problem types
Product status
AMD Software: Adrenalin Edition 25.12.1 (25.10.37.01)
AMD Software: Adrenalin Edition 25.11.1 (25.20.29.01)
AMD Software: PRO Edition 25.Q4 (25.10.37.01)
AMD Software: PRO Edition 25.Q3.1 (25.10.32)
ROCm 7.0
ROCm 7.0
ROCm 6.3.1
ROCm 6.3.1
ROCm 6.4.2
BKC 26 (ROCm 7.0.1)
Contact your AMD Customer Engineering representative
Contact your AMD Customer Engineering representative
Contact your AMD Customer Engineering representative
References
www.amd.com/...es/product-security/bulletin/AMD-SB-6027.html