Логотип exploitDog
bind:"BDU:2024-03709" OR bind:"CVE-2022-48662"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-03709" OR bind:"CVE-2022-48662"

Количество 64

Количество 64

fstec логотип

BDU:2024-03709

почти 3 года назад

Уязвимость функции context_close() в модуле drivers/gpu/drm/i915/gem/i915_gem_context.c драйвера Intel 8xx/9xx/G3x/G4x/HD Graphics ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20240814-04

11 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2022-48662

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2022-48662

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918....

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2022-48662

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-48662

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-8wq2-m78j-qq93

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.09...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3425-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3405-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3395-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3361-1

9 месяцев назад

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3348-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3336-1

9 месяцев назад

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3375-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3679-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3639-1

9 месяцев назад

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3347-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3318-1

9 месяцев назад

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3368-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3696-1

9 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-03709

Уязвимость функции context_close() в модуле drivers/gpu/drm/i915/gem/i915_gem_context.c драйвера Intel 8xx/9xx/G3x/G4x/HD Graphics ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
0%
Низкий
почти 3 года назад
redos логотип
ROS-20240814-04

Множественные уязвимости kernel-lt

CVSS3: 7.8
11 месяцев назад
ubuntu логотип
CVE-2022-48662

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017...

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2022-48662

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918....

CVSS3: 7.3
0%
Низкий
около 1 года назад
nvd логотип
CVE-2022-48662

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2022-48662

In the Linux kernel, the following vulnerability has been resolved: d ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-8wq2-m78j-qq93

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Really move i915_gem_context.link under ref protection i915_perf assumes that it can use the i915_gem_context reference to protect its i915->gem.contexts.list iteration. However, this requires that we do not remove the context from the list until after we drop the final reference and release the struct. If, as currently, we remove the context from the list during context_close(), the link.next pointer may be poisoned while we are holding the context reference and cause a GPF: [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180 [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.09...

CVSS3: 7.8
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3425-1

Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3405-1

Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3395-1

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3361-1

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3348-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3336-1

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3375-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3679-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3639-1

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3347-1

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3318-1

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3368-1

Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3696-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

9 месяцев назад

Уязвимостей на страницу