HomeDefault status
unaffected
2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before e08e9dd09809b16f8f8cee8c466841b33d24ed96
affected
2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before 90e065677e0362a777b9db97ea21d43a39211399
affected
Default status
affected
6.2
affected
Any version before 6.2
unaffected
6.4.11 (semver)
unaffected
6.5 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Security.
Product status
2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before e08e9dd09809b16f8f8cee8c466841b33d24ed96
2ebf61f2cfb9a11bc17db30df3e675a4cd7418d3 (git) before 90e065677e0362a777b9db97ea21d43a39211399
6.2
Any version before 6.2
6.4.11 (semver)
6.5 (original_commit_for_fix)
References
git.kernel.org/...c/e08e9dd09809b16f8f8cee8c466841b33d24ed96
git.kernel.org/...c/90e065677e0362a777b9db97ea21d43a39211399