Description

Improper system call parameter validation in the Trusted OS may allow a malicious driver to perform mapping or unmapping operations on a large number of pages, potentially resulting in kernel memory corruption.

INFO

Published Date :

2026-02-10T19:47:26.356Z

Last Modified :

2026-02-26T14:44:28.708Z

Source :

AMD
AFFECTED PRODUCTS

The following products are affected by CVE-2021-26381 vulnerability.

Vendors Products
Amd
  • Radeon Pro V520
  • Radeon Pro V620
  • Radeon Pro W5000 Series
  • Radeon Pro W6000 Series
  • Radeon Rx 5000 Series
  • Radeon Rx 6000 Series
  • Ryzen 5000 Series Desktop Processors
  • Ryzen 5000 Series Desktop Processors With Radeon Graphics
  • Ryzen 5000 Series Mobile Processors With Radeon Graphics
  • Ryzen Embedded 5000 Series Processors
  • Ryzen Embedded R1000 Series Processors
  • Ryzen Embedded R2000 Series Processors
  • Ryzen Embedded V1000 Series Processors
  • Ryzen Embedded V2000 Series Processors
  • Ryzen Embedded V3000 Series Processors
  • Ryzen Threadripper Pro 3000 Wx-series Processors
  • Ryzen Threadripper Pro 5000 Wx-series Processors
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2021-26381.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability