CVE-2022-49935
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
18/06/2025
Last modified:
14/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dma-buf/dma-resv: check if the new fence is really later<br />
<br />
Previously when we added a fence to a dma_resv object we always<br />
assumed the the newer than all the existing fences.<br />
<br />
With Jason&#39;s work to add an UAPI to explicit export/import that&#39;s not<br />
necessary the case any more. So without this check we would allow<br />
userspace to force the kernel into an use after free error.<br />
<br />
Since the change is very small and defensive it&#39;s probably a good<br />
idea to backport this to stable kernels as well just in case others<br />
are using the dma_resv object in the same way.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 5.19.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



