Executive Summary

Informations
Name CVE-2022-49530 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix double free in si_parse_power_table()

In function si_parse_power_table(), array adev->pm.dpm.ps and its member is allocated. If the allocation of each member fails, the array itself is freed and returned with an error code. However, the array is later freed again in si_dpm_fini() function which is called when the function returns an error.

This leads to potential double free of the array adev->pm.dpm.ps, as well as leak of its array members, since the members are not freed in the allocation function and the array is not nulled when freed. In addition adev->pm.dpm.num_ps, which keeps track of the allocated array member, is not updated until the member allocation is successfully finished, this could also lead to either use after free, or uninitialized variable access in si_dpm_fini().

Fix this by postponing the free of the array until si_dpm_fini() and increment adev->pm.dpm.num_ps everytime the array member is allocated.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49530

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-415 Double Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/2615464854505188f909d0c07c37a6623693b5c7
https://git.kernel.org/stable/c/43eb9b667b95f2a31c63e8949b0d2161b9be59c3
https://git.kernel.org/stable/c/6c5bdaa1325be7f04b79ea992ab216739192d342
https://git.kernel.org/stable/c/a5ce7051db044290b1a95045ff03c249005a3aa4
https://git.kernel.org/stable/c/af832028af6f44c6c45645757079c4ed6884ade5
https://git.kernel.org/stable/c/c0e811c4ccf3b42705976285e3a94cc82dea7300
https://git.kernel.org/stable/c/ca1ce206894dd976275c78ee38dbc19873f22de9
https://git.kernel.org/stable/c/f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bd
https://git.kernel.org/stable/c/fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07b
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-06-26 02:09:53
  • Multiple Updates
2025-06-25 12:22:44
  • Multiple Updates
2025-06-24 02:14:29
  • Multiple Updates
2025-05-27 02:11:15
  • Multiple Updates
2025-03-29 03:14:47
  • Multiple Updates
2025-03-28 13:35:08
  • Multiple Updates
2025-03-28 02:57:12
  • Multiple Updates
2025-03-19 00:20:57
  • Multiple Updates
2025-03-18 00:21:00
  • Multiple Updates
2025-03-14 00:21:28
  • Multiple Updates
2025-03-13 21:21:21
  • Multiple Updates
2025-03-11 00:21:36
  • Multiple Updates
2025-02-26 17:20:30
  • First insertion