Updated: 2026-02-27 00:22:59.392722
Description:
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue Delete fence fallback timer to fix the ramdom use-after-free issue. v2: move to amdgpu_mes.c
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.8 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 7.8 | HIGH | Not Vulnerable | 2025-08-21 05:55:25 | Not affected: this flaw exists only in the AMDGPU MES code path (drivers/gpu/drm/amd/amdgpu/amdgpu_m... | |
| RHEL 7 ELS | kernel | 3.10.0 | 7.8 | HIGH | Not Vulnerable | 2025-05-28 00:25:53 | CVE‑2024‑38581 is confined to the AMDGPU driver’s MES (Micro‑Engine Scheduler) code path and... | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Not Vulnerable | 2024-08-02 11:32:30 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Not Vulnerable | 2024-08-02 14:30:28 | ||
| Ubuntu 18.04 ELS | linux | 4.15.0 | 7.8 | HIGH | Not Vulnerable | 2024-08-02 14:30:28 | Not affected: CVE-2024-38581 targets a use-after-free in amdgpu MES introduced upstream in Linux 5.1... |