Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix size validation for non-exclusive domains (v4) Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the requested memory exists, else we get a kernel oops when dereferencing "man". v2: Make the patch standalone, i.e. not dependent on local patches. v3: Preserve old behaviour and just check that the manager pointer is not NULL. v4: Complain if GTT domain requested and it is uninitialized--most likely a bug.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 80546eef216854a7bd47e39e828f04b406c00599
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7554886daa31eacc8e7fac9e15bbce67d10b8f1f
affected

Default status
affected

6.0.19 (semver)
unaffected

6.1.5 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/80546eef216854a7bd47e39e828f04b406c00599

git.kernel.org/...c/8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1

git.kernel.org/...c/7554886daa31eacc8e7fac9e15bbce67d10b8f1f

cve.org (CVE-2022-50527)

nvd.nist.gov (CVE-2022-50527)

Download JSON