Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should be stop to avoid out-of-bounds read, so directly return -EINVAL.
References (7)
Core 7
Core References
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
1.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (7)
linux/Kernel
5.11.0 - 5.15.161linux
linux/Kernel
5.16.0 - 6.1.94linux
linux/Kernel
5.4.0 - 5.4.278linux
linux/Kernel
5.5.0 - 5.10.219linux
linux/Kernel
6.2.0 - 6.6.34linux
linux/Kernel
6.7.0 - 6.9.5linux
linux/linux_kernel
< 5.4.278
Published
Jun 25, 2024
Tracked Since
Feb 18, 2026