{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-26392","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","assignerShortName":"AMD","datePublished":"2022-11-09T20:44:26.258Z","dateUpdated":"2024-09-16T20:51:46.791Z","dateReserved":"2021-01-29T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"AMD Radeon RX 5000 Series & PRO W5000 Series","vendor":"AMD","versions":[{"lessThan":"22.5.2","status":"affected","version":"AMD Radeon Software","versionType":"custom"},{"lessThan":"22.Q2","status":"affected","version":"AMD Radeon Pro Software Enterprise","versionType":"custom"},{"lessThan":"22.10.20","status":"affected","version":"Enterprise Driver","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"AMD Radeon RX 6000 Series & PRO W6000 Series","vendor":"AMD","versions":[{"lessThan":"22.5.2","status":"affected","version":"AMD Radeon Software","versionType":"custom"},{"lessThan":"22.Q2","status":"affected","version":"AMD Radeon Pro Software Enterprise","versionType":"custom"},{"lessThan":"22.10.20","status":"affected","version":"Enterprise Driver","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™ Embedded R1000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™ Embedded R2000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™ Embedded 5000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™ Embedded V1000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™ Embedded V2000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"unaffected","product":"AMD Ryzen™Embedded V3000","vendor":"AMD","versions":[{"status":"affected","version":"various"}]}],"datePublic":"2022-11-08T05:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.</p>"}],"value":"Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA."}],"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2024-02-13T19:22:08.137Z"},"references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"},{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"}],"source":{"advisory":"AMD-SB-1029, AMD-SB-5001","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.0.9"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:26:25.366Z"},"title":"CVE Program Container","references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029","tags":["x_transferred"]},{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001","tags":["x_transferred"]}]}]}}