An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability.
An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD Radeon™ RX 5000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ RX 6000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ RX 7000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ RX Vega Series Graphics Cards | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ PRO W5000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ PRO W6000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ PRO W7000 Series Graphics Products | Radeon Software for Linux 24.30.2 |
| AMD | AMD Radeon™ VII | Radeon Software for Linux 24.30.2 |
| AMD | AMD Instinct™ MI200 | ROCm 6.3 |
| AMD | AMD Instinct™ MI210 | ROCm 6.3 |
| AMD | AMD Instinct™ MI250 | ROCm 6.3 |
| AMD | AMD Instinct™ MI300A | ROCm 6.3 |
| AMD | AMD Instinct™ MI300X | ROCm 6.3 |
| AMD | AMD Radeon™ PRO V520 Graphics Products | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V620 Graphics Products | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V710 Graphics Products | Contact your AMD Customer Engineering representative |
| AMD | AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ AI 300 Series Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 7000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 9000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 4000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
| AMD | AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | Radeon Software for Linux 24.30.2 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.