Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36323

AI Predicted 7.8 Difficulty: Moderate EPSS 0.01% · P2

Affected Version Matrix 8

VendorProductVersion RangeStatus
AMDAMD Instinct™ MI300AROCm 6.3unaffected
AMDAMD Instinct™ MI300XROCm 6.3unaffected
AMDAMD Instinct™ MI308XROC 6.3unaffected
AMDAMD Instinct™ MI325XROC 6.3unaffected
AMDAMD Radeon™ PRO W7000 Series Graphics ProductsRadeon Software for Linux 24.20.3unaffected
AMD Software: PRO Edition 25.Q3.1 (25.10.32)unaffected
AMDAMD Radeon™ RX 7000 Series Graphics ProductsRadeon Software for Linux 24.20.3unaffected
AMD Software: Adrenalin Edition 25.10.2 (25.20.21.01)unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36323

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper isolation of VCN-JPEG HW register space could allow a malicious Guest Virtual Machine (VM) or a process to perform unauthorized access to the register space of the JPEG cores assigned a victim VM/process, potentially gaining arbitrary read/write access to the victim VM/process data.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AMDAMD Radeon™ RX 7000 Series Graphics Products Radeon Software for Linux 24.20.3 -
AMDAMD Radeon™ PRO W7000 Series Graphics Products Radeon Software for Linux 24.20.3 -
AMDAMD Instinct™ MI308X ROC 6.3 -
AMDAMD Instinct™ MI325X ROC 6.3 -
AMDAMD Instinct™ MI300X ROCm 6.3 -
AMDAMD Instinct™ MI300A ROCm 6.3 -

II. Public POCs for CVE-2024-36323

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36323

登录查看更多情报信息。

Same Patch Batch · AMD · 2026-05-15 · 39 CVEs total

CVE-2025-52540AMD PMF驱动越界写入致提权
CVE-2025-0040NXP JTAG-AXI访问控制漏洞
CVE-2024-21962AMD RAID驱动输入验证缺陷致提权与代码执行
CVE-2025-29935AMD PMF越界写入漏洞(影响代码执行)
CVE-2025-29944AMD Sensor Fusion Hub 驱动缓冲区溢出致系统崩溃
CVE-2025-29938AMD PMF 版本未指定:未检查返回值致任意代码执行
CVE-2025-29937AMD PMF越界读取漏洞
CVE-2025-0028AMD PMF框架越界读写漏洞
CVE-2025-29936AMD平台管理框架输入验证缺陷导致权限提升
CVE-2025-48513AMD PMF未初始化资源漏洞
CVE-2021-26380Trusted OS驱动内存越界致完整性丢失
CVE-2025-48520AMD平台管理框架驱动越界读取漏洞
CVE-2025-48519AMD PMF驱动越界读写致提权漏洞
CVE-2025-0045AMD Secure Processor驱动输入验证漏洞致拒绝服务
CVE-2026-0432AMD芯片组驱动权限错误致提权
CVE-2025-48521ASP PCI驱动Use-After-Free漏洞致平台完整性丧失
CVE-2025-48512AMD GPIO控制器权限配置错误致提权
CVE-2024-36345AMD OverDrive SMM模块越界读取漏洞
CVE-2026-0438SMM handler执行非SMM内存代码导致远程代码执行漏洞
CVE-2023-31317AMD安全处理器越界内存读写致任意代码执行

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-36323

No comments yet


Leave a comment