-
CVE-2022-50527
- EPSS 0.03%
- Veröffentlicht 07.10.2025 15:19:19
- Zuletzt bearbeitet 08.10.2025 19:38:32
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix size validation for non-exclusive domains (v4)
Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the
requested memory exists, else we get a kernel oops when dereferencing "man".
v2: Make the patch standalone, i.e. not dependent on local patches.
v3: Preserve old behaviour and just check that the manager pointer is not
NULL.
v4: Complain if GTT domain requested and it is uninitialized--most likely a
bug.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
80546eef216854a7bd47e39e828f04b406c00599
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
7554886daa31eacc8e7fac9e15bbce67d10b8f1f
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version <
4.2
Version
0
Status
unaffected
Version <=
6.0.*
Version
6.0.19
Status
unaffected
Version <=
6.1.*
Version
6.1.5
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.06 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|