-

CVE-2022-50454

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()

nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm will call nouveau_bo_del_ttm() and
free the memory.Thus, when nouveau_bo_init() returns an error, the gem
object has already been released. Then the call to nouveau_bo_ref() will
use the freed "nvbo->bo" and lead to a use-after-free bug.

We should delete the call to nouveau_bo_ref() to avoid the use-after-free.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 56ee9577915dc06f55309901012a9ef68dbdb5a8
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 5d6093c49c098d86c7b136aba9922df44aeb6944
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 861f085f81fd569b02cc2c11165a9e6cca144424
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 3aeda2fe6517cc52663d4ce3588dd43f0d4124a7
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 7d80473e9f12548ac05b36af4fb9ce80f2f73509
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 540dfd188ea2940582841c1c220bd035a7db0e51
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string