CVE-2022-49963
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
14/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/i915/ttm: fix CCS handling<br />
<br />
Crucible + recent Mesa seems to sometimes hit:<br />
<br />
GEM_BUG_ON(num_ccs_blks > NUM_CCS_BLKS_PER_XFER)<br />
<br />
And it looks like we can also trigger this with gem_lmem_swapping, if we<br />
modify the test to use slightly larger object sizes.<br />
<br />
Looking closer it looks like we have the following issues in<br />
migrate_copy():<br />
<br />
- We are using plain integer in various places, which we can easily<br />
overflow with a large object.<br />
<br />
- We pass the entire object size (when the src is lmem) into<br />
emit_pte() and then try to copy it, which doesn&#39;t work, since we<br />
only have a few fixed sized windows in which to map the pages and<br />
perform the copy. With an object > 8M we therefore aren&#39;t properly<br />
copying the pages. And then with an object > 64M we trigger the<br />
GEM_BUG_ON(num_ccs_blks > NUM_CCS_BLKS_PER_XFER).<br />
<br />
So it looks like our copy handling for any object > 8M (which is our<br />
CHUNK_SZ) is currently broken on DG2.<br />
<br />
Testcase: igt@gem_lmem_swapping<br />
(cherry picked from commit 8676145eb2f53a9940ff70910caf0125bd8a4bc2)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 5.19.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



