{"uuid": "1d5c0267-6848-4f3b-88d8-84527c3719ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57920", "type": "seen", "source": "https://t.me/cvedetector/15852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57920 - Ampegu Null Pointer Dereference\", \n  \"Content\": \"CVE ID : CVE-2024-57920 \nPublished : Jan. 19, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amdkfd: wq_release signals dma_fence only when available  \n  \nkfd_process_wq_release() signals eviction fence by  \ndma_fence_signal() which wanrs if dma_fence  \nis NULL.  \n  \nkfd_process-&gt;ef is initialized by kfd_process_device_init_vm()  \nthrough ioctl. That means the fence is NULL for a new  \ncreated kfd_process, and close a kfd_process right  \nafter open it will trigger the warning.  \n  \nThis commit conditionally signals the eviction fence  \nin kfd_process_wq_release() only when it is available.  \n  \n[  503.660882] WARNING: CPU: 0 PID: 9 at drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0  \n[  503.782940] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]  \n[  503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0  \n[  503.877620] Call Trace:  \n[  503.880066]    \n[  503.882168]  ? __warn+0xcd/0x260  \n[  503.885407]  ? dma_fence_signal+0x74/0xa0  \n[  503.889416]  ? report_bug+0x288/0x2d0  \n[  503.893089]  ? handle_bug+0x53/0xa0  \n[  503.896587]  ? exc_invalid_op+0x14/0x50  \n[  503.900424]  ? asm_exc_invalid_op+0x16/0x20  \n[  503.904616]  ? dma_fence_signal+0x74/0xa0  \n[  503.908626]  kfd_process_wq_release+0x6b/0x370 [amdgpu]  \n[  503.914081]  process_one_work+0x654/0x10a0  \n[  503.918186]  worker_thread+0x6c3/0xe70  \n[  503.921943]  ? srso_alias_return_thunk+0x5/0xfbef5  \n[  503.926735]  ? srso_alias_return_thunk+0x5/0xfbef5  \n[  503.931527]  ? __kthread_parkme+0x82/0x140  \n[  503.935631]  ? __pfx_worker_thread+0x10/0x10  \n[  503.939904]  kthread+0x2a8/0x380  \n[  503.943132]  ? __pfx_kthread+0x10/0x10  \n[  503.946882]  ret_from_fork+0x2d/0x70  \n[  503.950458]  ? __pfx_kthread+0x10/0x10  \n[  503.954210]  ret_from_fork_asm+0x1a/0x30  \n[  503.958142]    \n[  503.960328] ---[ end trace 0000000000000000 ]---  \n  \n(cherry picked from commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T13:58:26.000000Z"}