CVE-2024-49989

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-49989
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49989.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49989
Downstream
Related
Published
2024-10-21T18:02:32.507Z
Modified
2025-11-27T19:33:52.319155Z
Summary
drm/amd/display: fix double free issue during amdgpu module unload
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix double free issue during amdgpu module unload

Flexible endpoints use DIGs from available inflexible endpoints, so only the encoders of inflexible links need to be freed. Otherwise, a double free issue may occur when unloading the amdgpu module.

[ 279.190523] RIP: 0010:_slabfree+0x152/0x2f0 [ 279.190577] Call Trace: [ 279.190580] <TASK> [ 279.190582] ? showregs+0x69/0x80 [ 279.190590] ? die+0x3b/0x90 [ 279.190595] ? dotrap+0xc8/0xe0 [ 279.190601] ? doerrortrap+0x73/0xa0 [ 279.190605] ? _slabfree+0x152/0x2f0 [ 279.190609] ? excinvalidop+0x56/0x70 [ 279.190616] ? _slabfree+0x152/0x2f0 [ 279.190642] ? asmexcinvalidop+0x1f/0x30 [ 279.190648] ? dcn10linkencoderdestroy+0x19/0x30 [amdgpu] [ 279.191096] ? _slabfree+0x152/0x2f0 [ 279.191102] ? dcn10linkencoderdestroy+0x19/0x30 [amdgpu] [ 279.191469] kfree+0x260/0x2b0 [ 279.191474] dcn10linkencoderdestroy+0x19/0x30 [amdgpu] [ 279.191821] linkdestroy+0xd7/0x130 [amdgpu] [ 279.192248] dcdestruct+0x90/0x270 [amdgpu] [ 279.192666] dcdestroy+0x19/0x40 [amdgpu] [ 279.193020] amdgpudmfini+0x16e/0x200 [amdgpu] [ 279.193432] dmhwfini+0x26/0x40 [amdgpu] [ 279.193795] amdgpudevicefinihw+0x24c/0x400 [amdgpu] [ 279.194108] amdgpudriverunloadkms+0x4f/0x70 [amdgpu] [ 279.194436] amdgpupciremove+0x40/0x80 [amdgpu] [ 279.194632] pcideviceremove+0x3a/0xa0 [ 279.194638] deviceremove+0x40/0x70 [ 279.194642] devicereleasedriverinternal+0x1ad/0x210 [ 279.194647] driverdetach+0x4e/0xa0 [ 279.194650] busremovedriver+0x6f/0xf0 [ 279.194653] driverunregister+0x33/0x60 [ 279.194657] pciunregisterdriver+0x44/0x90 [ 279.194662] amdgpuexit+0x19/0x1f0 [amdgpu] [ 279.194939] _dosysdeletemodule.isra.0+0x198/0x2f0 [ 279.194946] _x64sysdeletemodule+0x16/0x20 [ 279.194950] dosyscall64+0x58/0x120 [ 279.194954] entrySYSCALL64afterhwframe+0x6e/0x76 [ 279.194980] </TASK>

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2024/49xxx/CVE-2024-49989.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
43c296870740a3a264cdca9f18db12e12e9cfbdb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
df948b5ba6858d5da34f622d408e5517057cec07
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
cf6f3ebd6312d465fee096d1f58089b177c7c67f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
7af9e6fa63dbd43a61d4ecc8f59426596a75e507
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
3c0ff4de45ce2c5f7997a1ffa6eefee4b79e6b58
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
5.15.181
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.55
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.14
Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.3