First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-after-free during gpu recovery [Why] [ 754.862560] refcount_t: underflow; use-after-free. [ 754.862898] Call Trace: [ 754.862903] <TASK> [ 754.862913] amdgpu_job_free_cb+0xc2/0xe1 [amdgpu] [ 754.863543] drm_sched_main.cold+0x34/0x39 [amd_sched] [How] The fw_fence may be not init, check whether dma_fence_init is performed before job free
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.0.13 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux Kernel | =6.1-rc4 | |
Linux Kernel | =6.1-rc5 | |
Linux Kernel | =6.1-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48990 has been classified with a high severity due to its impact on the Linux kernel's GPU recovery process.
To mitigate CVE-2022-48990, update the Linux kernel to version 6.0.13 or any later version that addresses this vulnerability.
CVE-2022-48990 affects multiple versions of the Linux kernel, specifically those under 6.0.13 and between 6.1-rc1 to 6.1-rc6.
CVE-2022-48990 is a use-after-free vulnerability in the Linux kernel related to amdgpu GPU handling.
If exploited, CVE-2022-48990 could lead to system crashes, data corruption, or potentially allow an attacker to execute arbitrary code.