CVE-2024-36342: Intel GPU Driver Heap Overflow Arbitrary Code Execution
CVE-2024-36342 Published on September 6, 2025
Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.
Vulnerability Analysis
CVE-2024-36342 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Improper Validation of Specified Index, Position, or Offset in Input
The product receives input that is expected to specify an index, position, or offset into an indexable resource such as a buffer or file, but it does not validate or incorrectly validates that the specified index/position/offset has the required properties.
Products Associated with CVE-2024-36342
stack.watch emails you whenever new vulnerabilities are published in Intel Graphics Driver or Google Chrome. Just hit a watch button to start following.
Affected Versions
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics:- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version Radeon Software for Linux 25.10.x is unaffected.
- Version amd_chipset_software_7.06.02.123.exe , PSP driver version: 5.39.0.0 is unaffected.
- Version amd_chipset_software_7.06.02.123.exe , PSP driver version: 5.39.0.0 is unaffected.
- Version amd_chipset_software_7.06.02.123.exe , PSP driver version: 5.39.0.0 is unaffected.
- Version amd_chipset_software_7.06.02.123.exe , PSP driver version: 5.39.0.0 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version Radeon Software for Linux 25.10.1 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version ROCm 6.4 is unaffected.
- Version Contact your AMD Customer Engineering representative is unaffected.
- Version Contact your AMD Customer Engineering representative is unaffected.
- Version Contact your AMD Customer Engineering representative is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.