Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 27 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd xilinx Run Time
Vendors & Products Amd
Amd xilinx Run Time

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
Description Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
Weaknesses CWE-413
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-11-24T20:55:03.445Z

Reserved: 2024-10-10T20:27:11.925Z

Link: CVE-2025-0003

cve-icon Vulnrichment

Updated: 2025-11-24T20:54:41.255Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-24T21:16:01.820

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-0003

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-27T09:45:39Z