Количество 65
Количество 65

CVE-2024-35817
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue.

CVE-2024-35817
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue.

CVE-2024-35817
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue.
CVE-2024-35817
In the Linux kernel, the following vulnerability has been resolved: d ...

SUSE-SU-2024:3321-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)
GHSA-r5rh-f6h6-v872
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue.

BDU:2024-09716
Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2024:3425-1
Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)

SUSE-SU-2024:3405-1
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

SUSE-SU-2024:3395-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

SUSE-SU-2024:3361-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

SUSE-SU-2024:3666-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:3370-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:3363-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)

SUSE-SU-2024:3880-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2024:3700-1
Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)

SUSE-SU-2024:3375-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2024:3347-1
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:3318-1
Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

SUSE-SU-2024:3368-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-35817 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue. | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-35817 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue. | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-35817 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue. | 0% Низкий | около 1 года назад | |
CVE-2024-35817 In the Linux kernel, the following vulnerability has been resolved: d ... | 0% Низкий | около 1 года назад | ||
![]() | SUSE-SU-2024:3321-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 0% Низкий | 9 месяцев назад | |
GHSA-r5rh-f6h6-v872 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue. | 0% Низкий | около 1 года назад | ||
![]() | BDU:2024-09716 Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:3425-1 Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3405-1 Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3395-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3361-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3666-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3370-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3363-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3880-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3700-1 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3375-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3347-1 Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3318-1 Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3368-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 9 месяцев назад |
Уязвимостей на страницу