๐Ÿ” CVE Alert

CVE-2022-49530

HIGH 7.8

drm/amd/pm: fix double free in si_parse_power_table()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix double free in si_parse_power_table() In function si_parse_power_table(), array adev->pm.dpm.ps and its member is allocated. If the allocation of each member fails, the array itself is freed and returned with an error code. However, the array is later freed again in si_dpm_fini() function which is called when the function returns an error. This leads to potential double free of the array adev->pm.dpm.ps, as well as leak of its array members, since the members are not freed in the allocation function and the array is not nulled when freed. In addition adev->pm.dpm.num_ps, which keeps track of the allocated array member, is not updated until the member allocation is successfully finished, this could also lead to either use after free, or uninitialized variable access in si_dpm_fini(). Fix this by postponing the free of the array until si_dpm_fini() and increment adev->pm.dpm.num_ps everytime the array member is allocated.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
841686df9f7d2942cfd94d024b8591fa3f74ef7c < 2615464854505188f909d0c07c37a6623693b5c7 841686df9f7d2942cfd94d024b8591fa3f74ef7c < 6c5bdaa1325be7f04b79ea992ab216739192d342 841686df9f7d2942cfd94d024b8591fa3f74ef7c < c0e811c4ccf3b42705976285e3a94cc82dea7300 841686df9f7d2942cfd94d024b8591fa3f74ef7c < af832028af6f44c6c45645757079c4ed6884ade5 841686df9f7d2942cfd94d024b8591fa3f74ef7c < ca1ce206894dd976275c78ee38dbc19873f22de9 841686df9f7d2942cfd94d024b8591fa3f74ef7c < a5ce7051db044290b1a95045ff03c249005a3aa4 841686df9f7d2942cfd94d024b8591fa3f74ef7c < fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07b 841686df9f7d2942cfd94d024b8591fa3f74ef7c < 43eb9b667b95f2a31c63e8949b0d2161b9be59c3 841686df9f7d2942cfd94d024b8591fa3f74ef7c < f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bd
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2615464854505188f909d0c07c37a6623693b5c7 git.kernel.org: https://git.kernel.org/stable/c/6c5bdaa1325be7f04b79ea992ab216739192d342 git.kernel.org: https://git.kernel.org/stable/c/c0e811c4ccf3b42705976285e3a94cc82dea7300 git.kernel.org: https://git.kernel.org/stable/c/af832028af6f44c6c45645757079c4ed6884ade5 git.kernel.org: https://git.kernel.org/stable/c/ca1ce206894dd976275c78ee38dbc19873f22de9 git.kernel.org: https://git.kernel.org/stable/c/a5ce7051db044290b1a95045ff03c249005a3aa4 git.kernel.org: https://git.kernel.org/stable/c/fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07b git.kernel.org: https://git.kernel.org/stable/c/43eb9b667b95f2a31c63e8949b0d2161b9be59c3 git.kernel.org: https://git.kernel.org/stable/c/f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bd