CVE-2022-49489
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
26/02/2025
Last modified:
24/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume<br />
<br />
BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3<br />
<br />
Call trace:<br />
dpu_vbif_init_memtypes+0x40/0xb8<br />
dpu_runtime_resume+0xcc/0x1c0<br />
pm_generic_runtime_resume+0x30/0x44<br />
__genpd_runtime_resume+0x68/0x7c<br />
genpd_runtime_resume+0x134/0x258<br />
__rpm_callback+0x98/0x138<br />
rpm_callback+0x30/0x88<br />
rpm_resume+0x36c/0x49c<br />
__pm_runtime_resume+0x80/0xb0<br />
dpu_core_irq_uninstall+0x30/0xb0<br />
dpu_irq_uninstall+0x18/0x24<br />
msm_drm_uninit+0xd8/0x16c<br />
<br />
Patchwork: https://patchwork.freedesktop.org/patch/483255/<br />
[DB: fixed Fixes tag]
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19 (including) | 4.19.247 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.198 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.121 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.46 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.14 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/134760263f6441741db0b2970e7face6b34b6d1c
- https://git.kernel.org/stable/c/5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2
- https://git.kernel.org/stable/c/97ac682b6f7d36be5d934f86c9911066540a68f1
- https://git.kernel.org/stable/c/aa4cb188988dc6f1b3f4917d4dbc452150a5d871
- https://git.kernel.org/stable/c/ef10d0c68e8608848cd58fca2589685718426607
- https://git.kernel.org/stable/c/ef4bdaac7cb5416f236613ed9337ff0ea8ee329b
- https://git.kernel.org/stable/c/fa5186b279ecf44b14fb435540d2065be91cb1ed