This bug is awaiting verification that the linux/6.11.0-26.26 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-oracular-linux' to 'verification-done-oracular-
linux'. If the problem still exists, change the tag 'verification-
needed-oracular-linux' to 'verification-failed-oracular-linux'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-oracular-linux-v2 
verification-needed-oracular-linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106652

Title:
  drm/xe: prevent potential UAF in pf_provision_vf_ggtt()

Status in linux package in Ubuntu:
  New
Status in linux source package in Oracular:
  Fix Committed

Bug description:
  [ Impact ]

   * Potential UAF.

  [ Fix ]

  Cherry-pick from upstream:

  83dcf232cc drm/xe: prevent potential UAF in pf_provision_vf_ggtt()

  [ Test Plan ]

   * Compile and boot tested

  [ Where problems could occur ]

   * Regression in drm/xe driver

  [ Other info ]

   * Reported by intel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2106652/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to