Fix refcount leak bug in of_xudma_dev_get()
CVE-2022-48656
Key Information:
- Vendor
- Linux
- Status
- Linux
- Vendor
- CVE Published:
- 28 April 2024
Badges
Summary
A vulnerability exists in the Linux kernel's DMA engine, specifically concerning Texas Instruments' K3 UDMA private implementation. This issue arises from a reference count leak due to insufficient handling of the reference returned by of_parse_phandle(). The affected code does not properly release the resource when it is no longer in use or during failure paths, leading to potential resource mismanagement. Proper mitigation involves moving the call to of_node_put() earlier in the code flow to ensure that resources are released appropriately, thereby preventing leaks that could hinder system stability.
Affected Version(s)
Linux d702419134133db1eab2067dc6ea5723467fd917
Linux d702419134133db1eab2067dc6ea5723467fd917
Linux d702419134133db1eab2067dc6ea5723467fd917
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved