-

CVE-2022-50527

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix size validation for non-exclusive domains (v4)

Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the
requested memory exists, else we get a kernel oops when dereferencing "man".

v2: Make the patch standalone, i.e. not dependent on local patches.
v3: Preserve old behaviour and just check that the manager pointer is not
    NULL.
v4: Complain if GTT domain requested and it is uninitialized--most likely a
    bug.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 80546eef216854a7bd47e39e828f04b406c00599
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 7554886daa31eacc8e7fac9e15bbce67d10b8f1f
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.2
Status affected
Version < 4.2
Version 0
Status unaffected
Version <= 6.0.*
Version 6.0.19
Status unaffected
Version <= 6.1.*
Version 6.1.5
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.06
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String