HomeDefault status
unaffected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5a577de86c4a1c67ca405571d6ef84e65c6897d1
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9e46b8bb0539d7bc9a9e7b3072fa4f6082490392
affected
Default status
affected
6.17.8 (semver)
unaffected
6.18 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate userq buffer virtual address and size It needs to validate the userq object virtual address to determine whether it is residented in a valid vm mapping.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5a577de86c4a1c67ca405571d6ef84e65c6897d1
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9e46b8bb0539d7bc9a9e7b3072fa4f6082490392
6.17.8 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/5a577de86c4a1c67ca405571d6ef84e65c6897d1
git.kernel.org/...c/9e46b8bb0539d7bc9a9e7b3072fa4f6082490392