Improper validation of user input in the NPU driver could allow an attacker to provide a buffer with unexpected size, potentially leading to system crash.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo |
Thu, 14 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Amd
Amd ryzen Ai Software |
|
CPEs | cpe:2.3:a:amd:ryzen_ai_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Amd
Amd ryzen Ai Software |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper validation of user input in the NPU driver could allow an attacker to provide a buffer with unexpected size, potentially leading to system crash. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-11-14T18:32:15.710Z
Reserved: 2024-01-03T16:43:21.323Z
Link: CVE-2024-21949

Updated: 2024-11-14T18:32:11.737Z

Status : Analyzed
Published: 2024-11-12T18:15:18.813
Modified: 2024-11-15T19:20:23.167
Link: CVE-2024-21949

No data.