In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
May 17, 2024
to the GitHub Advisory Database
•
Updated Jan 10, 2025
Description
Published by the National Vulnerability Database
May 17, 2024
Published to the GitHub Advisory Database
May 17, 2024
Last updated
Jan 10, 2025
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: fix a double-free in si_dpm_init
When the allocation of
adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,
amdgpu_free_extended_power_table is called to free some fields of adev.
However, when the control flow returns to si_dpm_sw_init, it goes to
label dpm_failed and calls si_dpm_fini, which calls
amdgpu_free_extended_power_table again and free those fields again. Thus
a double-free is triggered.
References