Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix double free in si_parse_power_table() In function si_parse_power_table(), array adev->pm.dpm.ps and its member is allocated. If the allocation of each member fails, the array itself is freed and returned with an error code. However, the array is later freed again in si_dpm_fini() function which is called when the function returns an error. This leads to potential double free of the array adev->pm.dpm.ps, as well as leak of its array members, since the members are not freed in the allocation function and the array is not nulled when freed. In addition adev->pm.dpm.num_ps, which keeps track of the allocated array member, is not updated until the member allocation is successfully finished, this could also lead to either use after free, or uninitialized variable access in si_dpm_fini(). Fix this by postponing the free of the array until si_dpm_fini() and increment adev->pm.dpm.num_ps everytime the array member is allocated.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 4.9.318 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2615464854505188f909d0c07c37a6623693b5c7Patch
- https://git.kernel.org/stable/c/43eb9b667b95f2a31c63e8949b0d2161b9be59c3Patch
- https://git.kernel.org/stable/c/6c5bdaa1325be7f04b79ea992ab216739192d342Patch
- https://git.kernel.org/stable/c/a5ce7051db044290b1a95045ff03c249005a3aa4Patch
- https://git.kernel.org/stable/c/af832028af6f44c6c45645757079c4ed6884ade5Patch
- https://git.kernel.org/stable/c/c0e811c4ccf3b42705976285e3a94cc82dea7300Patch
- https://git.kernel.org/stable/c/ca1ce206894dd976275c78ee38dbc19873f22de9Patch
- https://git.kernel.org/stable/c/f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bdPatch
- https://git.kernel.org/stable/c/fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07bPatch
FAQ
What is CVE-2022-49530?
CVE-2022-49530 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix double free in si_parse_power_table() In function si_parse_power_table(), array adev->pm.dpm.ps and its member is ...
How severe is CVE-2022-49530?
CVE-2022-49530 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49530?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.