In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 This
reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same
heap. The basic problem here is that after the move the old location is
simply not available any more. Some fixes were suggested, but essentially
we should call the move notification before actually moving things because
only this way we have the correct order for DMA-buf and VM move
notifications as well. Also rework the statistic handling so that we don’t
update the eviction counter before the move. v2: add missing NULL check
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/d3a9331a6591e9df64791e076f6591f440af51c3 (6.9-rc7)
git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3
launchpad.net/bugs/cve/CVE-2024-27400
nvd.nist.gov/vuln/detail/CVE-2024-27400
security-tracker.debian.org/tracker/CVE-2024-27400
www.cve.org/CVERecord?id=CVE-2024-27400