{"uuid": "2c34cda5-d3f1-429d-8b5b-77f8f2f2df4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57921", "type": "seen", "source": "https://t.me/cvedetector/15845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57921 - AMD GPU amdgpu: Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57921 \nPublished : Jan. 19, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amdgpu: Add a lock when accessing the buddy trim function  \n  \nWhen running YouTube videos and Steam games simultaneously,  \nthe tester found a system hang / race condition issue with  \nthe multi-display configuration setting. Adding a lock to  \nthe buddy allocator's trim function would be the solution.  \n  \n  \n[ 7197.250436] general protection fault, probably for non-canonical address 0xdead000000000108  \n[ 7197.250447] RIP: 0010:__alloc_range+0x8b/0x340 [amddrm_buddy]  \n[ 7197.250470] Call Trace:  \n[ 7197.250472]    \n[ 7197.250475]  ? show_regs+0x6d/0x80  \n[ 7197.250481]  ? die_addr+0x37/0xa0  \n[ 7197.250483]  ? exc_general_protection+0x1db/0x480  \n[ 7197.250488]  ? drm_suballoc_new+0x13c/0x93d [drm_suballoc_helper]  \n[ 7197.250493]  ? asm_exc_general_protection+0x27/0x30  \n[ 7197.250498]  ? __alloc_range+0x8b/0x340 [amddrm_buddy]  \n[ 7197.250501]  ? __alloc_range+0x109/0x340 [amddrm_buddy]  \n[ 7197.250506]  amddrm_buddy_block_trim+0x1b5/0x260 [amddrm_buddy]  \n[ 7197.250511]  amdgpu_vram_mgr_new+0x4f5/0x590 [amdgpu]  \n[ 7197.250682]  amdttm_resource_alloc+0x46/0xb0 [amdttm]  \n[ 7197.250689]  ttm_bo_alloc_resource+0xe4/0x370 [amdttm]  \n[ 7197.250696]  amdttm_bo_validate+0x9d/0x180 [amdttm]  \n[ 7197.250701]  amdgpu_bo_pin+0x15a/0x2f0 [amdgpu]  \n[ 7197.250831]  amdgpu_dm_plane_helper_prepare_fb+0xb2/0x360 [amdgpu]  \n[ 7197.251025]  ? try_wait_for_completion+0x59/0x70  \n[ 7197.251030]  drm_atomic_helper_prepare_planes.part.0+0x2f/0x1e0  \n[ 7197.251035]  drm_atomic_helper_prepare_planes+0x5d/0x70  \n[ 7197.251037]  drm_atomic_helper_commit+0x84/0x160  \n[ 7197.251040]  drm_atomic_nonblocking_commit+0x59/0x70  \n[ 7197.251043]  drm_mode_atomic_ioctl+0x720/0x850  \n[ 7197.251047]  ? __pfx_drm_mode_atomic_ioctl+0x10/0x10  \n[ 7197.251049]  drm_ioctl_kernel+0xb9/0x120  \n[ 7197.251053]  ? srso_alias_return_thunk+0x5/0xfbef5  \n[ 7197.251056]  drm_ioctl+0x2d4/0x550  \n[ 7197.251058]  ? __pfx_drm_mode_atomic_ioctl+0x10/0x10  \n[ 7197.251063]  amdgpu_drm_ioctl+0x4e/0x90 [amdgpu]  \n[ 7197.251186]  __x64_sys_ioctl+0xa0/0xf0  \n[ 7197.251190]  x64_sys_call+0x143b/0x25c0  \n[ 7197.251193]  do_syscall_64+0x7f/0x180  \n[ 7197.251197]  ? srso_alias_return_thunk+0x5/0xfbef5  \n[ 7197.251199]  ? amdgpu_display_user_framebuffer_create+0x215/0x320 [amdgpu]  \n[ 7197.251329]  ? drm_internal_framebuffer_create+0xb7/0x1a0  \n[ 7197.251332]  ? srso_alias_return_thunk+0x5/0xfbef5  \n  \n(cherry picked from commit 3318ba94e56b9183d0304577c74b33b6b01ce516) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T13:58:17.000000Z"}