{"vulnerability": "CVE-2024-49989", "sightings": [{"uuid": "5990aeb8-c2b0-44db-95c4-6dbf03815158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-49989", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "a60ca522-b8dc-4302-84a2-11555ae8023b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49989", "type": "seen", "source": "https://t.me/cvedetector/8511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49989 - AMDGPU Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49989 \nPublished : Oct. 21, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amd/display: fix double free issue during amdgpu module unload  \n  \nFlexible endpoints use DIGs from available inflexible endpoints,  \nso only the encoders of inflexible links need to be freed.  \nOtherwise, a double free issue may occur when unloading the  \namdgpu module.  \n  \n[  279.190523] RIP: 0010:__slab_free+0x152/0x2f0  \n[  279.190577] Call Trace:  \n[  279.190580]    \n[  279.190582]  ? show_regs+0x69/0x80  \n[  279.190590]  ? die+0x3b/0x90  \n[  279.190595]  ? do_trap+0xc8/0xe0  \n[  279.190601]  ? do_error_trap+0x73/0xa0  \n[  279.190605]  ? __slab_free+0x152/0x2f0  \n[  279.190609]  ? exc_invalid_op+0x56/0x70  \n[  279.190616]  ? __slab_free+0x152/0x2f0  \n[  279.190642]  ? asm_exc_invalid_op+0x1f/0x30  \n[  279.190648]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]  \n[  279.191096]  ? __slab_free+0x152/0x2f0  \n[  279.191102]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]  \n[  279.191469]  kfree+0x260/0x2b0  \n[  279.191474]  dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]  \n[  279.191821]  link_destroy+0xd7/0x130 [amdgpu]  \n[  279.192248]  dc_destruct+0x90/0x270 [amdgpu]  \n[  279.192666]  dc_destroy+0x19/0x40 [amdgpu]  \n[  279.193020]  amdgpu_dm_fini+0x16e/0x200 [amdgpu]  \n[  279.193432]  dm_hw_fini+0x26/0x40 [amdgpu]  \n[  279.193795]  amdgpu_device_fini_hw+0x24c/0x400 [amdgpu]  \n[  279.194108]  amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu]  \n[  279.194436]  amdgpu_pci_remove+0x40/0x80 [amdgpu]  \n[  279.194632]  pci_device_remove+0x3a/0xa0  \n[  279.194638]  device_remove+0x40/0x70  \n[  279.194642]  device_release_driver_internal+0x1ad/0x210  \n[  279.194647]  driver_detach+0x4e/0xa0  \n[  279.194650]  bus_remove_driver+0x6f/0xf0  \n[  279.194653]  driver_unregister+0x33/0x60  \n[  279.194657]  pci_unregister_driver+0x44/0x90  \n[  279.194662]  amdgpu_exit+0x19/0x1f0 [amdgpu]  \n[  279.194939]  __do_sys_delete_module.isra.0+0x198/0x2f0  \n[  279.194946]  __x64_sys_delete_module+0x16/0x20  \n[  279.194950]  do_syscall_64+0x58/0x120  \n[  279.194954]  entry_SYSCALL_64_after_hwframe+0x6e/0x76  \n[  279.194980] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:01:59.000000Z"}]}