In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()
nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm will call nouveau_bo_del_ttm() and
free the memory.Thus, when nouveau_bo_init() returns an error, the gem
object has already been released. Then the call to nouveau_bo_ref() will
use the freed "nvbo->bo" and lead to a use-after-free bug.
We should delete the call to nouveau_bo_ref() to avoid the use-after-free.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 12:15
Updated : 2026-01-16 19:24
NVD link : CVE-2022-50454
Mitre link : CVE-2022-50454
CVE.ORG link : CVE-2022-50454
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
