CVE-2022-50068

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50068
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50068.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50068
Downstream
Related
Published
2025-06-18T11:02:13Z
Modified
2025-10-16T06:15:19.413582Z
Summary
drm/ttm: Fix dummy res NULL ptr deref bug
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Fix dummy res NULL ptr deref bug

Check the bo->resource value before accessing the resource mem_type.

v2: Fix commit description unwrapped warning

<log snip> [ 40.191227][ T184] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN PTI [ 40.192995][ T184] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 40.194411][ T184] CPU: 1 PID: 184 Comm: systemd-udevd Not tainted 5.19.0-rc4-00721-gb297c22b7070 #1 [ 40.196063][ T184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014 [ 40.199605][ T184] RIP: 0010:ttmbovalidate+0x1b3/0x240 [ttm] [ 40.200754][ T184] Code: e8 72 c5 ff ff 83 f8 b8 74 d4 85 c0 75 54 49 8b 9e 58 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 44 8b 53 10 31 c0 85 d2 0f 85 58 [ 40.203685][ T184] RSP: 0018:ffffc900006df0c8 EFLAGS: 00010202 [ 40.204630][ T184] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1102f4bb71b [ 40.205864][ T184] RDX: 0000000000000002 RSI: ffffc900006df208 RDI: 0000000000000010 [ 40.207102][ T184] RBP: 1ffff920000dbe1a R08: ffffc900006df208 R09: 0000000000000000 [ 40.208394][ T184] R10: ffff88817a5f0000 R11: 0000000000000001 R12: ffffc900006df110 [ 40.209692][ T184] R13: ffffc900006df0f0 R14: ffff88817a5db800 R15: ffffc900006df208 [ 40.210862][ T184] FS: 00007f6b1d16e8c0(0000) GS:ffff88839d700000(0000) knlGS:0000000000000000 [ 40.212250][ T184] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.213275][ T184] CR2: 000055a1001d4ff0 CR3: 00000001700f4000 CR4: 00000000000006e0 [ 40.214469][ T184] Call Trace: [ 40.214974][ T184] <TASK> [ 40.215438][ T184] ? ttmbobouncetempbuffer+0x140/0x140 [ttm] [ 40.216572][ T184] ? mutexspinonowner+0x240/0x240 [ 40.217456][ T184] ? drmvmaoffsetadd+0xaa/0x100 [drm] [ 40.218457][ T184] ttmboinitreserved+0x3d6/0x540 [ttm] [ 40.219410][ T184] ? shmemgetinode+0x744/0x980 [ 40.220231][ T184] ttmboinitvalidate+0xb1/0x200 [ttm] [ 40.221172][ T184] ? bodriverevictflags+0x340/0x340 [drmvramhelper] [ 40.222530][ T184] ? ttmboinitreserved+0x540/0x540 [ttm] [ 40.223643][ T184] ? _dosysfinitmodule+0x11a/0x1c0 [ 40.224654][ T184] ? _shmemfilesetup+0x102/0x280 [ 40.234764][ T184] drmgemvramcreate+0x305/0x480 [drmvramhelper] [ 40.235766][ T184] ? bodriverevictflags+0x340/0x340 [drmvramhelper] [ 40.236846][ T184] ? _kasanslabfree+0x108/0x180 [ 40.237650][ T184] drmgemvramfillcreatedumb+0x134/0x340 [drmvramhelper] [ 40.238864][ T184] ? localpciprobe+0xdf/0x180 [ 40.239674][ T184] ? drmmvramhelperinit+0x400/0x400 [drmvramhelper] [ 40.240826][ T184] drmclientframebuffercreate+0x19c/0x400 [drm] [ 40.241955][ T184] ? drmclientbufferdelete+0x200/0x200 [drm] [ 40.243001][ T184] ? drmclientpickcrtcs+0x554/0xb80 [drm] [ 40.244030][ T184] drmfbhelpergenericprobe+0x23f/0x940 [drmkmshelper] [ 40.245226][ T184] ? _condresched+0x1c/0xc0 [ 40.245987][ T184] ? drmfbhelpermemoryrangetoclip+0x180/0x180 [drmkmshelper] [ 40.247316][ T184] ? mutexunlock+0x80/0x100 [ 40.248005][ T184] ? _mutexunlockslowpath+0x2c0/0x2c0 [ 40.249083][ T184] drmfbhelpersinglefbprobe+0x907/0xf00 [drmkmshelper] [ 40.250314][ T184] ? drmfbhelpercheckvar+0x1180/0x1180 [drmkmshelper] [ 40.251540][ T184] ? _condresched+0x1c/0xc0 [ 40.252321][ T184] ? mutexlock+0x9f/0x100 [ 40.253062][ T184] _drmfbhelperinitialconfigandunlock+0xb9/0x2c0 [drmkmshelper] [ 40.254394][ T184] drmfbdevclienthotplug+0x56f/0x840 [drmkmshelper] [ 40.255477][ T184] drmfbdevgenericsetup+0x165/0x3c0 [drmkmshelper] [ 40.256607][ T184] bochspciprobe+0x6b7/0x900 [bochs] [
---truncated---

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3116756a710e3cd51293a9d58b525957ab7e784
Fixed
76672cd326c146ded2c2712ff257b8908dcf23d8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3116756a710e3cd51293a9d58b525957ab7e784
Fixed
9bd970d4097287778a4449452e70b35d0bfaa3aa
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3116756a710e3cd51293a9d58b525957ab7e784
Fixed
cf4b7387c0a842d64bdd7c353e6d3298174a7740

Affected versions

v5.*

v5.13
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.2
v5.19.3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.63
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.4