In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: range check cp bad op exception interrupts

Due to a CP interrupt bug, bad packet garbage exception codes are raised.
Do a range check so that the debugger and runtime do not receive garbage
codes.
Update the user api to guard exception code type checking as well.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-05-04T09:12:41.370Z

Reserved: 2024-05-30T15:25:07.080Z

Link: CVE-2024-36951

cve-icon Vulnrichment

Updated: 2024-08-02T03:43:50.487Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-30T16:15:18.080

Modified: 2024-11-21T09:22:53.537

Link: CVE-2024-36951

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-30T00:00:00Z

Links: CVE-2024-36951 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T21:07:23Z