![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-48662 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gem: Really move i915_gem_context.link under ref protection
i915_perf assumes that it can use the i915_gem_context reference to
protect its i915->gem.contexts.list iteration. However, this requires
that we do not remove the context from the list until after we drop
the final reference and release the struct. If, as currently, we
remove the context from the list during context_close(), the link.next
pointer may be poisoned while we are holding the context reference and
cause a GPF: [ 4070.573157] i915 0000:00:02.0:
[drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff
ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably
for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [
4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E
5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation
NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017
[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350
[i915] [ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff
ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f
8e fa 00 00 00 <49> 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f
85 34 fe ff [ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202
[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX:
0000000000000000 [ 4070.575000] RDX: 0000000000000001 RSI:
ffffc90002077b20 RDI: ffff88810ddc7c68 [ 4070.575004] RBP:
0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc [
4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12:
ffff888101bf1860 [ 4070.575012] R13: dead0000000000b0 R14:
ffffc90002077c04 R15: ffff88810be5cabc [ 4070.575016] FS:
00007f1ed50c0780(0000) GS:ffff88885ec80000(0000)
knlGS:0000000000000000 [ 4070.575021] CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 [ 4070.575025] CR2: 00007f1ed5590280 CR3:
000000010ef6f005 CR4: 00000000003706e0 [ 4070.575029] Call Trace: [
4070.575033] |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48662 https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1 https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1 https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02 https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02 https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d |