{"uuid": "66450148-08c2-490f-adf6-42c2e5aa4f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48849", "type": "seen", "source": "https://t.me/cvedetector/968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48849 - AMDgpu Tiling Flag Check Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-48849 \nPublished : July 16, 2024, 1:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amdgpu: bypass tiling flag check in virtual display case (v2)  \n  \nvkms leverages common amdgpu framebuffer creation, and  \nalso as it does not support FB modifier, there is no need  \nto check tiling flags when initing framebuffer when virtual  \ndisplay is enabled.  \n  \nThis can fix below calltrace:  \n  \namdgpu 0000:00:08.0: GFX9+ requires FB check based on format modifier  \nWARNING: CPU: 0 PID: 1023 at drivers/gpu/drm/amd/amdgpu/amdgpu_display.c:1150 amdgpu_display_framebuffer_init+0x8e7/0xb40 [amdgpu]  \n  \nv2: check adev-&gt;enable_virtual_display instead as vkms can be  \n enabled in bare metal as well. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T16:17:13.000000Z"}