HomeDefault status
unaffected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5045360f3bb62ccd4f87202e33489f71f8bbc3fc
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5ca14fb5552ac13a2402d306c0bd2379a71610ff
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9da050b0d9e04439d225a2ec3044af70cdfb3933
affected
Default status
affected
6.1.23 (semver)
unaffected
6.2.10 (semver)
unaffected
6.3 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5045360f3bb62ccd4f87202e33489f71f8bbc3fc
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5ca14fb5552ac13a2402d306c0bd2379a71610ff
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9da050b0d9e04439d225a2ec3044af70cdfb3933
6.1.23 (semver)
6.2.10 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/5045360f3bb62ccd4f87202e33489f71f8bbc3fc
git.kernel.org/...c/5ca14fb5552ac13a2402d306c0bd2379a71610ff
git.kernel.org/...c/9da050b0d9e04439d225a2ec3044af70cdfb3933