CVE-2022-48990

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48990
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48990.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48990
Downstream
Related
Published
2024-10-21T20:06:07Z
Modified
2025-10-15T17:25:16.917561Z
Summary
drm/amdgpu: fix use-after-free during gpu recovery
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free during gpu recovery

[Why] [ 754.862560] refcountt: underflow; use-after-free. [ 754.862898] Call Trace: [ 754.862903] <TASK> [ 754.862913] amdgpujobfreecb+0xc2/0xe1 [amdgpu] [ 754.863543] drmschedmain.cold+0x34/0x39 [amd_sched]

[How] The fwfence may be not init, check whether dmafence_init is performed before job free

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6a3f66063ca39e7ee5fcee59e889c5ec4de9dc0
Fixed
d2a89cd942edd50c1e652004fd64019be78b0a96
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6a3f66063ca39e7ee5fcee59e889c5ec4de9dc0
Fixed
3cb93f390453cde4d6afda1587aaa00e75e09617

Affected versions

v5.*

v5.19
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.13