CVE-2022-50527

Source
https://cve.org/CVERecord?id=CVE-2022-50527
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50527.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50527
Downstream
Related
Published
2025-10-07T15:19:19.238Z
Modified
2026-03-23T05:31:39.436798Z
Summary
drm/amdgpu: Fix size validation for non-exclusive domains (v4)
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix size validation for non-exclusive domains (v4)

Fix amdgpubovalidate_size() to check whether the TTM domain manager for the requested memory exists, else we get a kernel oops when dereferencing "man".

v2: Make the patch standalone, i.e. not dependent on local patches. v3: Preserve old behaviour and just check that the manager pointer is not NULL. v4: Complain if GTT domain requested and it is uninitialized--most likely a bug.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50527.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Fixed
80546eef216854a7bd47e39e828f04b406c00599
Fixed
8ba7c55e112f4ffd2a95b99be1cb1c891ef08ba1
Fixed
7554886daa31eacc8e7fac9e15bbce67d10b8f1f

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50527.json"