In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix a use-after-free
looks like we forget to set ttm->sg to NULL.
Hit panic below
[ 1235.844104] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI
[ 1235.989074] Call Trace:
[ 1235.991751] sg_free_table+0x17/0x20
[ 1235.995667] amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu]
[ 1236.002288] amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu]
[ 1236.008464] ttm_tt_destroy+0x1e/0x30 [ttm]
[ 1236.013066] ttm_bo_cleanup_memtype_use+0x51/0xa0 [ttm]
[ 1236.018783] ttm_bo_release+0x262/0xa50 [ttm]
[ 1236.023547] ttm_bo_put+0x82/0xd0 [ttm]
[ 1236.027766] amdgpu_bo_unref+0x26/0x50 [amdgpu]
[ 1236.032809] amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu]
[ 1236.040400] kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu]
[ 1236.046912] kfd_ioctl+0x463/0x690 [amdgpu]
References
Configurations
Configuration 1 (hide)
|
History
17 Dec 2024, 14:56
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d - Patch | |
References | () https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2 - Patch | |
References | () https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a - Patch | |
References | () https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e - Patch | |
References | () https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122 - Patch | |
References | () https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17 - Patch | |
References | () https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa - Patch | |
References | () https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2024-03-25 09:15
Updated : 2024-12-17 14:56
NVD link : CVE-2021-47142
Mitre link : CVE-2021-47142
CVE.ORG link : CVE-2021-47142
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free