Impact
An out‑of‑bounds write is present in the AMDGV_CMD_GET_DIAG_DATA ioctl handler. A local user who can invoke this ioctl could cause memory corruption that may lead to arbitrary code execution. This vulnerability falls under CWE‑787, indicating unsafe handling of buffer offsets or lengths. If exploited, an attacker could raise privileges on the host system by running code with elevated rights.
Affected Systems
The flaw affects AMD Instinct GPU families MI210, MI250, MI300A, MI300X, MI308X, MI325X and the Radeon PRO series V620 and V710. These GPUs are typically used in data‑center or workstation environments. No specific firmware or driver version ranges are listed in the advisory.
Risk and Exploitability
The CVSS score of 8.5 marks the issue as high severity. EPSS is not available, and the vulnerability is not yet listed in the CISA KEV catalog. The known attack path requires a local user to execute a malicious ioctl; therefore the attack is practical on systems where the compromised user can access the GPU device. Once triggered, the out‑of‑bounds write can escape the driver context and execute arbitrary code, achieving privilege escalation.
OpenCVE Enrichment