In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: range check cp bad op exception interrupts Due to a CP interrupt bug, bad packet garbage exception codes are raised. Do a range check so that the debugger and runtime do not receive garbage codes. Update the user api to guard exception code type checking as well.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | <=Â 6.1.106-3 | linux_6.1.106-3_all.deb |
Debian | 11 | all | linux | <=Â 5.10.223-1 | linux_5.10.223-1_all.deb |
Debian | 999 | all | linux | <Â 6.8.11-1 | linux_6.8.11-1_all.deb |
Debian | 13 | all | linux | <Â 6.8.11-1 | linux_6.8.11-1_all.deb |