CVE-2022-49935

In the Linux kernel, the following vulnerability has been resolved: dma-buf/dma-resv: check if the new fence is really later Previously when we added a fence to a dma_resv object we always assumed the the newer than all the existing fences. With Jason's work to add an UAPI to explicit export/import that's not necessary the case any more. So without this check we would allow userspace to force the kernel into an use after free error. Since the change is very small and defensive it's probably a good idea to backport this to stable kernels as well just in case others are using the dma_resv object in the same way.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*

History

14 Nov 2025, 20:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/a3f7c10a269d5b77dd5822ade822643ced3057f0 - () https://git.kernel.org/stable/c/a3f7c10a269d5b77dd5822ade822643ced3057f0 - Patch
References () https://git.kernel.org/stable/c/c4c798fe98adceb642050819cb57cbc8f5c27870 - () https://git.kernel.org/stable/c/c4c798fe98adceb642050819cb57cbc8f5c27870 - Patch
CWE CWE-416
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*

Information

Published : 2025-06-18 11:15

Updated : 2025-11-14 20:24


NVD link : CVE-2022-49935

Mitre link : CVE-2022-49935

CVE.ORG link : CVE-2022-49935


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free