CVE-2022-49137

In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This issue takes place in an error path in amdgpu_cs_fence_to_handle_ioctl(). When `info->in.what` falls into default case, the function simply returns -EINVAL, forgetting to decrement the reference count of a dma_fence obj, which is bumped earlier by amdgpu_cs_get_fence(). This may result in reference count leaks. Fix it by decreasing the refcount of specific object before returning the error code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu/amdgpu_cs: se corrige la pérdida de recuento de referencias de un objeto dma_fence Este problema se produce en una ruta de error en amdgpu_cs_fence_to_handle_ioctl(). Cuando `info->in.what` cae en el caso predeterminado, la función simplemente devuelve -EINVAL, olvidando disminuir el recuento de referencias de un objeto dma_fence, que es aumentado anteriormente por amdgpu_cs_get_fence(). Esto puede provocar fugas de recuento de referencias. Arréglelo disminuyendo el recuento de referencias de un objeto específico antes de devolver el código de error.
CWE NVD-CWE-Other
References () https://git.kernel.org/stable/c/3edd8646cb7c11b57c90e026bda6f21076223f5b - () https://git.kernel.org/stable/c/3edd8646cb7c11b57c90e026bda6f21076223f5b - Patch
References () https://git.kernel.org/stable/c/4009f104b02b223d1a11d74b36b1cc083bc37028 - () https://git.kernel.org/stable/c/4009f104b02b223d1a11d74b36b1cc083bc37028 - Patch
References () https://git.kernel.org/stable/c/72d77ddb2224ebc00648f4f78f8a9a259dccbdf7 - () https://git.kernel.org/stable/c/72d77ddb2224ebc00648f4f78f8a9a259dccbdf7 - Patch
References () https://git.kernel.org/stable/c/927beb05aaa429c883cc0ec6adc48964b187e291 - () https://git.kernel.org/stable/c/927beb05aaa429c883cc0ec6adc48964b187e291 - Patch
References () https://git.kernel.org/stable/c/b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf - () https://git.kernel.org/stable/c/b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf - Patch
References () https://git.kernel.org/stable/c/bc2d5c0775c839e2b072884f4ee6a93ba410f107 - () https://git.kernel.org/stable/c/bc2d5c0775c839e2b072884f4ee6a93ba410f107 - Patch
References () https://git.kernel.org/stable/c/dfced44f122c500004a48ecc8db516bb6a295a1b - () https://git.kernel.org/stable/c/dfced44f122c500004a48ecc8db516bb6a295a1b - Patch

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-13 21:31


NVD link : CVE-2022-49137

Mitre link : CVE-2022-49137

CVE.ORG link : CVE-2022-49137


JSON object : View

Products Affected

linux

  • linux_kernel