We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() Since the gang_size check is outside of chunk parsing loop, we need to reset i before we free the chunk data. Suggested by Ye Zhang (@VAR10CK) of Baidu Security.
Reserved 2024-08-21 | Published 2024-11-19 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/9a2393af1f35d1975204fc00035c64a1c792b278
git.kernel.org/...c/e08e9dd09809b16f8f8cee8c466841b33d24ed96
git.kernel.org/...c/90e065677e0362a777b9db97ea21d43a39211399
Support options