The CVE describes an assertion failure !replacements.count(op). The linked GitHub issue #59182 provides a stack trace for this assertion, identifying mlir::detail::ConversionPatternRewriterImpl::notifyOpReplaced in DialectConversion.cpp as the site of the crash. The stack trace also implicates the (anonymous namespace)::GenericAtomicRMWOpLowering::matchAndRewrite pattern and the overall (anonymous namespace)::GpuToLLVMConversionPass as key components in the sequence of operations leading to the failure. Commit a0138390, mentioned in the CVE, is a version of the codebase where this MLIR assertion was discovered/triggerable; however, the changes within commit a0138390 itself are related to a Clang diagnostic fix and do not directly modify these MLIR functions. The identified functions are based on the runtime stack trace from the issue, which reflects the state of the program when the vulnerability is triggered.
Ongoing coverage of React2Shell