In the Linux kernel, the following vulnerability has been resolved:
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This issue takes place in an error path in
amdgpu_cs_fence_to_handle_ioctl(). When `info->in.what` falls into
default case, the function simply returns -EINVAL, forgetting to
decrement the reference count of a dma_fence obj, which is bumped
earlier by amdgpu_cs_get_fence(). This may result in reference count
leaks.
Fix it by decreasing the refcount of specific object before returning
the error code.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 21:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
CWE | NVD-CWE-Other | |
References | () https://git.kernel.org/stable/c/3edd8646cb7c11b57c90e026bda6f21076223f5b - Patch | |
References | () https://git.kernel.org/stable/c/4009f104b02b223d1a11d74b36b1cc083bc37028 - Patch | |
References | () https://git.kernel.org/stable/c/72d77ddb2224ebc00648f4f78f8a9a259dccbdf7 - Patch | |
References | () https://git.kernel.org/stable/c/927beb05aaa429c883cc0ec6adc48964b187e291 - Patch | |
References | () https://git.kernel.org/stable/c/b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf - Patch | |
References | () https://git.kernel.org/stable/c/bc2d5c0775c839e2b072884f4ee6a93ba410f107 - Patch | |
References | () https://git.kernel.org/stable/c/dfced44f122c500004a48ecc8db516bb6a295a1b - Patch |
26 Feb 2025, 07:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:00
Updated : 2025-03-13 21:31
NVD link : CVE-2022-49137
Mitre link : CVE-2022-49137
CVE.ORG link : CVE-2022-49137
JSON object : View
Products Affected
linux
- linux_kernel
CWE