In the Linux kernel, the following vulnerability has been resolved:
dma-buf/dma-resv: check if the new fence is really later
Previously when we added a fence to a dma_resv object we always
assumed the the newer than all the existing fences.
With Jason's work to add an UAPI to explicit export/import that's not
necessary the case any more. So without this check we would allow
userspace to force the kernel into an use after free error.
Since the change is very small and defensive it's probably a good
idea to backport this to stable kernels as well just in case others
are using the dma_resv object in the same way.
References
Configurations
Configuration 1 (hide)
|
History
14 Nov 2025, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-416 | |
| References | () https://git.kernel.org/stable/c/a3f7c10a269d5b77dd5822ade822643ced3057f0 - Patch | |
| References | () https://git.kernel.org/stable/c/c4c798fe98adceb642050819cb57cbc8f5c27870 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| Summary |
|
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-14 20:24
NVD link : CVE-2022-49935
Mitre link : CVE-2022-49935
CVE.ORG link : CVE-2022-49935
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
