In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: range check cp bad op exception interrupts Due to a CP interrupt bug, bad packet garbage exception codes are raised. Do a range check so that the debugger and runtime do not receive garbage codes. Update the user api to guard exception code type checking as well.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-30T15:35:46.868Z

Updated: 2024-11-05T09:28:40.966Z

Reserved: 2024-05-30T15:25:07.080Z

Link: CVE-2024-36951

cve-icon Vulnrichment

Updated: 2024-08-02T03:43:50.487Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-30T16:15:18.080

Modified: 2024-05-30T18:18:58.870

Link: CVE-2024-36951

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-30T00:00:00Z

Links: CVE-2024-36951 - Bugzilla