First published: Fri May 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again In SRIOV configuration, the reset may failed to bring asic back to normal but stop cpsch already been called, the start_cpsch will not be called since there is no resume in this case. When reset been triggered again, driver should avoid to do uninitialization again.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <5.10.84 | |
Linux Kernel | >=5.11<5.15.7 | |
Linux Kernel | =5.16-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47551 has a medium severity rating due to potential impacts on system stability.
To resolve CVE-2021-47551, update your Linux kernel to a version that includes the fix for this vulnerability.
CVE-2021-47551 affects the AMD Linux Kernel in environments using SRIOV configuration.
CVE-2021-47551 primarily poses a risk of system instability rather than direct exploitation by attackers.
CVE-2021-47551 was published in 2021 following its identification in the Linux kernel.