-

CVE-2022-50527

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix size validation for non-exclusive domains (v4)

Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the
requested memory exists, else we get a kernel oops when dereferencing "man".

v2: Make the patch standalone, i.e. not dependent on local patches.
v3: Preserve old behaviour and just check that the manager pointer is not
    NULL.
v4: Complain if GTT domain requested and it is uninitialized--most likely a
    bug.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 80546eef216854a7bd47e39e828f04b406c00599
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7554886daa31eacc8e7fac9e15bbce67d10b8f1f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 6.0.*
Version 6.0.19
Status unaffected
Version <= 6.1.*
Version 6.1.5
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string