-

CVE-2022-50454

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()

nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm will call nouveau_bo_del_ttm() and
free the memory.Thus, when nouveau_bo_init() returns an error, the gem
object has already been released. Then the call to nouveau_bo_ref() will
use the freed "nvbo->bo" and lead to a use-after-free bug.

We should delete the call to nouveau_bo_ref() to avoid the use-after-free.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 56ee9577915dc06f55309901012a9ef68dbdb5a8
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 5d6093c49c098d86c7b136aba9922df44aeb6944
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 861f085f81fd569b02cc2c11165a9e6cca144424
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 3aeda2fe6517cc52663d4ce3588dd43f0d4124a7
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 7d80473e9f12548ac05b36af4fb9ce80f2f73509
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
Version < 540dfd188ea2940582841c1c220bd035a7db0e51
Version 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String