We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52921

drm/amdgpu: fix possible UAF in amdgpu_cs_pass1()



Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Security.

Reserved 2024-08-21 | Published 2024-11-19 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9a2393af1f35d1975204fc00035c64a1c792b278
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e08e9dd09809b16f8f8cee8c466841b33d24ed96
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 90e065677e0362a777b9db97ea21d43a39211399
affected

Default status
affected

6.1.46
unaffected

6.4.11
unaffected

6.5
unaffected

References

git.kernel.org/...c/9a2393af1f35d1975204fc00035c64a1c792b278

git.kernel.org/...c/e08e9dd09809b16f8f8cee8c466841b33d24ed96

git.kernel.org/...c/90e065677e0362a777b9db97ea21d43a39211399

cve.org (CVE-2023-52921)

nvd.nist.gov (CVE-2023-52921)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-52921

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.