This bug is awaiting verification that the linux/6.11.0-26.26 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-oracular-linux' to 'verification-done-oracular- linux'. If the problem still exists, change the tag 'verification- needed-oracular-linux' to 'verification-failed-oracular-linux'.
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-oracular-linux-v2 verification-needed-oracular-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2106652 Title: drm/xe: prevent potential UAF in pf_provision_vf_ggtt() Status in linux package in Ubuntu: New Status in linux source package in Oracular: Fix Committed Bug description: [ Impact ] * Potential UAF. [ Fix ] Cherry-pick from upstream: 83dcf232cc drm/xe: prevent potential UAF in pf_provision_vf_ggtt() [ Test Plan ] * Compile and boot tested [ Where problems could occur ] * Regression in drm/xe driver [ Other info ] * Reported by intel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2106652/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp