Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Security.

PUBLISHED Reserved 2024-08-21 | Published 2024-11-19 | Updated 2025-06-19 | Assigner Linux

Product status

Default status
unaffected

2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before e08e9dd09809b16f8f8cee8c466841b33d24ed96
affected

2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before 90e065677e0362a777b9db97ea21d43a39211399
affected

Default status
affected

6.2
affected

Any version before 6.2
unaffected

6.4.11 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/e08e9dd09809b16f8f8cee8c466841b33d24ed96

git.kernel.org/...c/90e065677e0362a777b9db97ea21d43a39211399

cve.org (CVE-2023-52921)

nvd.nist.gov (CVE-2023-52921)

Download JSON