In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: range check cp bad op exception interrupts Due to a CP interrupt bug, bad packet garbage exception codes are raised. Do a range check so that the debugger and runtime do not receive garbage codes. Update the user api to guard exception code type checking as well.
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | unspecified |
| Linux | Linux | <= 1.3.1 |
| Linux | Linux | <= 6.0.10 |