Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Radeon_pro_software
(Amd)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-06-11 | CVE-2020-12980 | An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12981 | An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12982 | An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12983 | An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12985 | An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12986 | An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service. | Radeon_pro_software, Radeon_software | 7.8 | ||
2021-06-11 | CVE-2020-12987 | A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass. | Radeon_pro_software, Radeon_software | 5.5 | ||
2022-11-09 | CVE-2021-26360 | An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP. | Enterprise_driver, Radeon_pro_software, Radeon_software | 7.8 | ||
2022-11-09 | CVE-2021-26391 | Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel. | Enterprise_driver, Radeon_pro_software, Radeon_rx_vega_56_firmware, Radeon_rx_vega_64_firmware, Radeon_software, Ryzen_3_5300g_firmware, Ryzen_3_5300ge_firmware, Ryzen_3_5300u_firmware, Ryzen_3_5400u_firmware, Ryzen_5_5500u_firmware, Ryzen_5_5560u_firmware, Ryzen_5_5600g_firmware, Ryzen_5_5600ge_firmware, Ryzen_5_5600h_firmware, Ryzen_5_5600hs_firmware, Ryzen_5_5600u_firmware, Ryzen_7_5700g_firmware, Ryzen_7_5700ge_firmware, Ryzen_7_5700u_firmware, Ryzen_7_5800h_firmware, Ryzen_7_5800hs_firmware, Ryzen_7_5800u_firmware, Ryzen_9_5900hs_firmware, Ryzen_9_5900hx_firmware, Ryzen_9_5980hs_firmware, Ryzen_9_5980hx_firmware | 7.8 | ||
2022-02-04 | CVE-2020-12891 | AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable. | Radeon_pro_software, Radeon_software | 7.8 |