SARA / Free Tools / CVE / CVE-2024-36316

CVE-2024-36316 — The integer overflow vulnerability within AMD Graphics driver could allow an att

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

CVSS
5.5 MEDIUM
EPSS
2.00% (top 96.30%)
CWE
CWE-190
Published
2026-02-11T14:27:25.373Z
Last modified
2026-02-11T15:43:13.415Z
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

01What is this vulnerability?

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

02Affected products

VendorProductVersions
AMD / AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics;
AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics — AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMD / AMD Ryzen™ 7000 Series Desktop Processors;
AMD Ryzen™ 8000 Series Desktop Processors;
AMD Ryzen™ 9000 Series Desktop Processors — AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range")AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ Al Max+AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ Embedded 8000 Series ProcessorsAMD Software: Adrenalin Edition 25.6.1 / AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ Embedded 7000 Series ProcessorsAMD Software: Adrenalin Edition 25.6.1 / AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ RX 6000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO W6000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ RX 7000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO W7000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO V520Contact your AMD Customer Engineering representative
AMDAMD Radeon™ PRO V620Contact your AMD Customer Engineering representative
AMDAMD Radeon™ PRO V710Contact your AMD Customer Engineering representative

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →