{"id":"CVE-2021-47142","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a use-after-free\n\nlooks like we forget to set ttm-\u003esg to NULL.\nHit panic below\n\n[ 1235.844104] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI\n[ 1235.989074] Call Trace:\n[ 1235.991751]  sg_free_table+0x17/0x20\n[ 1235.995667]  amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu]\n[ 1236.002288]  amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu]\n[ 1236.008464]  ttm_tt_destroy+0x1e/0x30 [ttm]\n[ 1236.013066]  ttm_bo_cleanup_memtype_use+0x51/0xa0 [ttm]\n[ 1236.018783]  ttm_bo_release+0x262/0xa50 [ttm]\n[ 1236.023547]  ttm_bo_put+0x82/0xd0 [ttm]\n[ 1236.027766]  amdgpu_bo_unref+0x26/0x50 [amdgpu]\n[ 1236.032809]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu]\n[ 1236.040400]  kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu]\n[ 1236.046912]  kfd_ioctl+0x463/0x690 [amdgpu]","modified":"2026-03-15T22:43:07.564811Z","published":"2024-03-25T09:15:08.843Z","related":["SUSE-SU-2024:1454-1","SUSE-SU-2024:1465-1","SUSE-SU-2024:1489-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1870-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122"},{"type":"FIX","url":"https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17"},{"type":"FIX","url":"https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa"},{"type":"FIX","url":"https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47142.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.271"}]},{"events":[{"introduced":"4.9.0"},{"fixed":"4.9.271"}]},{"events":[{"introduced":"4.14.0"},{"fixed":"4.14.235"}]},{"events":[{"introduced":"4.19.0"},{"fixed":"4.19.193"}]},{"events":[{"introduced":"5.4.0"},{"fixed":"5.4.124"}]},{"events":[{"introduced":"5.10.0"},{"fixed":"5.10.42"}]},{"events":[{"introduced":"5.12.0"},{"fixed":"5.12.9"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}