In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate doorbell_offset in user queue creation amdgpu_userq_get_doorbell_index() passes the user-provided doorbell_offset to amdgpu_doorbell_index_on_bar() without bounds checking. An arbitrarily large doorbell_offset can cause the calculated doorbell index to fall outside the allocated doorbell BO, potentially corrupting kernel doorbell space. Validate that doorbell_offset falls within the doorbell BO before computing the BAR index, using u64 arithmetic to prevent overflow. (cherry picked from commit de1ef4ffd70e1d15f0bf584fd22b1f28cbd5e2ec)
| Vendor | Product | Versions |
|---|---|---|
| amd | amdgpu | f09c1e6077abd1bc2ddd2b97e1135215801ca7f9, f09c1e6077abd1bc2ddd2b97e1135215801ca7f9, f09c1e6077abd1bc2ddd2b97e1135215801ca7f9, 6.16 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| linux | linux | mitre_affected | 90% |
| open source | open source linux kernel | cert_advisory | 90% |
Updated description with new details, changed severity to CRITICAL, and added affected versions 6.18.21 and 6.19.11.
Initial creation