CVE-2022-49137

In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This issue takes place in an error path in amdgpu_cs_fence_to_handle_ioctl(). When `info->in.what` falls into default case, the function simply returns -EINVAL, forgetting to decrement the reference count of a dma_fence obj, which is bumped earlier by amdgpu_cs_get_fence(). This may result in reference count leaks. Fix it by decreasing the refcount of specific object before returning the error code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:31

Type Values Removed Values Added
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu/amdgpu_cs: se corrige la pérdida de recuento de referencias de un objeto dma_fence Este problema se produce en una ruta de error en amdgpu_cs_fence_to_handle_ioctl(). Cuando `info->in.what` cae en el caso predeterminado, la función simplemente devuelve -EINVAL, olvidando disminuir el recuento de referencias de un objeto dma_fence, que es aumentado anteriormente por amdgpu_cs_get_fence(). Esto puede provocar fugas de recuento de referencias. Arréglelo disminuyendo el recuento de referencias de un objeto específico antes de devolver el código de error.
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/3edd8646cb7c11b57c90e026bda6f21076223f5b - () https://git.kernel.org/stable/c/3edd8646cb7c11b57c90e026bda6f21076223f5b - Patch
References () https://git.kernel.org/stable/c/4009f104b02b223d1a11d74b36b1cc083bc37028 - () https://git.kernel.org/stable/c/4009f104b02b223d1a11d74b36b1cc083bc37028 - Patch
References () https://git.kernel.org/stable/c/72d77ddb2224ebc00648f4f78f8a9a259dccbdf7 - () https://git.kernel.org/stable/c/72d77ddb2224ebc00648f4f78f8a9a259dccbdf7 - Patch
References () https://git.kernel.org/stable/c/927beb05aaa429c883cc0ec6adc48964b187e291 - () https://git.kernel.org/stable/c/927beb05aaa429c883cc0ec6adc48964b187e291 - Patch
References () https://git.kernel.org/stable/c/b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf - () https://git.kernel.org/stable/c/b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf - Patch
References () https://git.kernel.org/stable/c/bc2d5c0775c839e2b072884f4ee6a93ba410f107 - () https://git.kernel.org/stable/c/bc2d5c0775c839e2b072884f4ee6a93ba410f107 - Patch
References () https://git.kernel.org/stable/c/dfced44f122c500004a48ecc8db516bb6a295a1b - () https://git.kernel.org/stable/c/dfced44f122c500004a48ecc8db516bb6a295a1b - Patch

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-01 20:15


NVD link : CVE-2022-49137

Mitre link : CVE-2022-49137

CVE.ORG link : CVE-2022-49137


JSON object : View

Products Affected

linux

  • linux_kernel