CVE-2022-48893

Source
https://cve.org/CVERecord?id=CVE-2022-48893
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48893.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48893
Downstream
Related
Published
2024-08-21T06:10:25.448Z
Modified
2026-04-11T12:43:13.015741Z
Summary
drm/i915/gt: Cleanup partial engine discovery failures
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Cleanup partial engine discovery failures

If we abort driver initialisation in the middle of gt/engine discovery, some engines will be fully setup and some not. Those incompletely setup engines only have 'engine->release == NULL' and so will leak any of the common objects allocated.

v2: - Drop the destroypinnedcontext() helper for now. It's not really worth it with just a single callsite at the moment. (Janusz)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48893.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7d70a1233d11ce9286e1a04c4f1bcd263e3e405e
Fixed
78350c36fb15afef423404a83dcbc5c558dce795
Fixed
7d21587d35bc816c85a51b8686f0f7e8e676fb14
Fixed
5c855bcc730656c4b7d30aaddcd0eafc7003e112
Fixed
78a033433a5ae4fee85511ee075bc9a48312c79e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48893.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.237
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.181
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48893.json"