Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-36316

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-11 Feb, 2026 | 14:27
Updated At-11 Feb, 2026 | 15:43
Rejected At-
Credits

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:11 Feb, 2026 | 14:27
Updated At:11 Feb, 2026 | 15:43
Rejected At:
▼CVE Numbering Authority (CNA)

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 7000 Series Desktop Processors; AMD Ryzen™ 8000 Series Desktop Processors; AMD Ryzen™ 9000 Series Desktop Processors
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range")
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ Al Max+
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ Embedded 8000 Series Processors
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.6.1 / AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ Embedded 7000 Series Processors
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.6.1 / AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ RX 6000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO W6000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ RX 7000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO W7000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO V520
Default Status
affected
Versions
Unaffected
  • Contact your AMD Customer Engineering representative
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO V620
Default Status
affected
Versions
Unaffected
  • Contact your AMD Customer Engineering representative
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO V710
Default Status
affected
Versions
Unaffected
  • Contact your AMD Customer Engineering representative
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190 Integer Overflow or Wraparound
Type: CWE
CWE ID: CWE-190
Description: CWE-190 Integer Overflow or Wraparound
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Reported through AMD Bug Bounty Program
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:11 Feb, 2026 | 15:16
Updated At:11 Feb, 2026 | 15:27

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-190Secondarypsirt@amd.com
CWE ID: CWE-190
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.htmlpsirt@amd.com
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
Source: psirt@amd.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

203Records found

CVE-2022-49197
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.22%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:55
Updated-11 May, 2026 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
af_netlink: Fix shift out of bounds in group mask calculation

In the Linux kernel, the following vulnerability has been resolved: af_netlink: Fix shift out of bounds in group mask calculation When a netlink message is received, netlink_recvmsg() fills in the address of the sender. One of the fields is the 32-bit bitfield nl_groups, which carries the multicast group on which the message was received. The least significant bit corresponds to group 1, and therefore the highest group that the field can represent is 32. Above that, the UB sanitizer flags the out-of-bounds shift attempts. Which bits end up being set in such case is implementation defined, but it's either going to be a wrong non-zero value, or zero, which is at least not misleading. Make the latter choice deterministic by always setting to 0 for higher-numbered multicast groups. To get information about membership in groups >= 32, userspace is expected to use nl_pktinfo control messages[0], which are enabled by NETLINK_PKTINFO socket option. [0] https://lwn.net/Articles/147608/ The way to trigger this issue is e.g. through monitoring the BRVLAN group: # bridge monitor vlan & # ip link add name br type bridge Which produces the following citation: UBSAN: shift-out-of-bounds in net/netlink/af_netlink.c:162:19 shift exponent 32 is too large for 32-bit type 'int'

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-49222
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.24%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:55
Updated-11 May, 2026 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/bridge: anx7625: Fix overflow issue on reading EDID

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: anx7625: Fix overflow issue on reading EDID The length of EDID block can be longer than 256 bytes, so we should use `int` instead of `u8` for the `edid_pos` variable.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-38674
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.60%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 05:27
Updated-26 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services.

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t610t820sc9832et760t606s8000t616t310androidt618sc7731et612sc9863at770SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-400
Uncontrolled Resource Consumption
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found