Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-48893— drm/i915/gt: Cleanup partial engine discovery failures

EPSS 0.01% · P1

Affected Version Matrix 10

VendorProductVersion RangeStatus
LinuxLinux7d70a1233d11ce9286e1a04c4f1bcd263e3e405e< 78350c36fb15afef423404a83dcbc5c558dce795affected
7d70a1233d11ce9286e1a04c4f1bcd263e3e405e< 7d21587d35bc816c85a51b8686f0f7e8e676fb14affected
7d70a1233d11ce9286e1a04c4f1bcd263e3e405e< 5c855bcc730656c4b7d30aaddcd0eafc7003e112affected
7d70a1233d11ce9286e1a04c4f1bcd263e3e405e< 78a033433a5ae4fee85511ee075bc9a48312c79eaffected
5.6affected
< 5.6unaffected
5.10.237≤ 5.10.*unaffected
5.15.181≤ 5.15.*unaffected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-48893

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
drm/i915/gt: Cleanup partial engine discovery failures
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Cleanup partial engine discovery failures If we abort driver initialisation in the middle of gt/engine discovery, some engines will be fully setup and some not. Those incompletely setup engines only have 'engine->release == NULL' and so will leak any of the common objects allocated. v2: - Drop the destroy_pinned_context() helper for now. It's not really worth it with just a single callsite at the moment. (Janusz)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于 drm/i915/gt 组件在清理部分引擎发现失败时存在问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 7d70a1233d11ce9286e1a04c4f1bcd263e3e405e ~ 78350c36fb15afef423404a83dcbc5c558dce795 -
LinuxLinux 5.6 -

II. Public POCs for CVE-2022-48893

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-48893

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-21 · 69 CVEs total

CVE-2022-48876wifi: mac80211: fix initialization of rx->link and rx->link_sta
CVE-2024-43874crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
CVE-2024-43873vhost/vsock: always initialize seqpacket_allow
CVE-2024-43875PCI: endpoint: Clean up error handling in vpci_scan_bus()
CVE-2022-48870tty: fix possible null-ptr-defer in spk_ttyio_release
CVE-2022-48871tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer
CVE-2022-48872misc: fastrpc: Fix use-after-free race condition for maps
CVE-2022-48873misc: fastrpc: Don't remove map on creater_process and device_release
CVE-2022-48874misc: fastrpc: Fix use-after-free and race in fastrpc_map_find
CVE-2022-48875wifi: mac80211: sdata can be NULL during AMPDU start
CVE-2022-48869USB: gadgetfs: Fix race between mounting and unmounting
CVE-2022-48877f2fs: let's avoid panic if extent_tree is not created
CVE-2022-48878Bluetooth: hci_qca: Fix driver shutdown on closed serdev
CVE-2022-48879efi: fix NULL-deref in init error path
CVE-2022-48880platform/surface: aggregator: Add missing call to ssam_request_sync_free()
CVE-2022-48881platform/x86/amd: Fix refcount leak in amd_pmc_probe
CVE-2022-48882net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)
CVE-2022-48883net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent
CVE-2022-48884net/mlx5: Fix command stats access after free
CVE-2022-48885ice: Fix potential memory leak in ice_gnss_tty_write()

Showing top 20 of 69 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48893

No comments yet


Leave a comment