Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-after-free during gpu recovery [Why] [ 754.862560] refcount_t: underflow; use-after-free. [ 754.862898] Call Trace: [ 754.862903] <TASK> [ 754.862913] amdgpu_job_free_cb+0xc2/0xe1 [amdgpu] [ 754.863543] drm_sched_main.cold+0x34/0x39 [amd_sched] [How] The fw_fence may be not init, check whether dma_fence_init is performed before job free

PUBLISHED Reserved 2024-08-22 | Published 2024-10-21 | Updated 2025-05-21 | Assigner Linux

Product status

Default status
unaffected

f6a3f66063ca39e7ee5fcee59e889c5ec4de9dc0 (git) before d2a89cd942edd50c1e652004fd64019be78b0a96
affected

f6a3f66063ca39e7ee5fcee59e889c5ec4de9dc0 (git) before 3cb93f390453cde4d6afda1587aaa00e75e09617
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.0.13 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d2a89cd942edd50c1e652004fd64019be78b0a96

git.kernel.org/...c/3cb93f390453cde4d6afda1587aaa00e75e09617

cve.org (CVE-2022-48990)

nvd.nist.gov (CVE-2022-48990)

Download JSON