CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
15.5%
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again
In SRIOV configuration, the reset may failed to bring asic back to normal
but stop cpsch already been called, the start_cpsch will not be called
since there is no resume in this case. When reset been triggered again,
driver should avoid to do uninitialization again.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/linus/2cf49e00d40d5132e3d067b5aa6d84791929ab15 (5.16-rc2)
git.kernel.org/stable/c/06c6f8f86ec243b89e52f0c3dc7062bcb9de74df
git.kernel.org/stable/c/2cf49e00d40d5132e3d067b5aa6d84791929ab15
git.kernel.org/stable/c/74aafe99efb68f15e50be9f7032c2168512f98a8
launchpad.net/bugs/cve/CVE-2021-47551
nvd.nist.gov/vuln/detail/CVE-2021-47551
security-tracker.debian.org/tracker/CVE-2021-47551
www.cve.org/CVERecord?id=CVE-2021-47551