CVE-2023-31307

Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
OR cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
OR cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*

History

13 Dec 2024, 16:30

Type Values Removed Values Added
First Time Amd radeon Software
Amd radeon Rx 6600m
Amd radeon Pro W6600
Amd radeon Pro W6300
Amd radeon Rx 6650m
Amd radeon Rx 6750 Xt
Amd
Amd radeon Rx 6650m Xt
Amd radeon Rx 6750 Gre
Amd radeon Pro W6400
Amd radeon Rx 6800
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6900 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6850m Xt
Amd radeon Rx 6700
Amd radeon Rx 6650 Xt
Amd radeon Rx 6950 Xt
Amd radeon Rx 6450m
Amd radeon Rx 6600 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6400
Amd radeon Rx 6600s
Amd radeon Rx 6500 Xt
Amd radeon Rx 6800s
Amd radeon Rx 6700s
Amd radeon Rx 6700 Xt
Amd radeon Rx 6800 Xt
Amd radeon Rx 6550m
Amd radeon Rx 6700m
Amd radeon Rx 6600
Amd radeon Rx 6550s
References () https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html - () https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html - Vendor Advisory
CPE cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*

03 Dec 2024, 17:15

Type Values Removed Values Added
Summary
  • (es) La validación inadecuada del índice de matriz en el firmware de administración de energía (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los límites dentro de PMFW, lo que podría provocar una denegación de servicio.
CWE CWE-129

13 Aug 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-13 17:15

Updated : 2024-12-13 16:30


NVD link : CVE-2023-31307

Mitre link : CVE-2023-31307

CVE.ORG link : CVE-2023-31307


JSON object : View

Products Affected

amd

  • radeon_rx_6700m
  • radeon_rx_6850m_xt
  • radeon_rx_6550s
  • radeon_rx_6550m
  • radeon_pro_w6800
  • radeon_rx_6700_xt
  • radeon_pro_w6400
  • radeon_rx_6700s
  • radeon_software
  • radeon_rx_6600_xt
  • radeon_rx_6800_xt
  • radeon_rx_6650_xt
  • radeon_rx_6750_xt
  • radeon_rx_6750_gre
  • radeon_rx_6800m
  • radeon_rx_6400
  • radeon_pro_w6300
  • radeon_rx_6600
  • radeon_rx_6900_xt
  • radeon_rx_6500m
  • radeon_rx_6300m
  • radeon_rx_6700
  • radeon_rx_6950_xt
  • radeon_rx_6800s
  • radeon_rx_6450m
  • radeon_pro_w6600
  • radeon_rx_6650m
  • radeon_rx_6800
  • radeon_rx_6600s
  • radeon_rx_6600m
  • radeon_rx_6500_xt
  • radeon_rx_6650m_xt
CWE
CWE-129

Improper Validation of Array Index