CVE-2022-49460
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
22/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PM / devfreq: rk3399_dmc: Disable edev on remove()<br />
<br />
Otherwise we hit an unablanced enable-count when unbinding the DFI<br />
device:<br />
<br />
[ 1279.659119] ------------[ cut here ]------------<br />
[ 1279.659179] WARNING: CPU: 2 PID: 5638 at drivers/devfreq/devfreq-event.c:360 devfreq_event_remove_edev+0x84/0x8c<br />
...<br />
[ 1279.659352] Hardware name: Google Kevin (DT)<br />
[ 1279.659363] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO BTYPE=--)<br />
[ 1279.659371] pc : devfreq_event_remove_edev+0x84/0x8c<br />
[ 1279.659380] lr : devm_devfreq_event_release+0x1c/0x28<br />
...<br />
[ 1279.659571] Call trace:<br />
[ 1279.659582] devfreq_event_remove_edev+0x84/0x8c<br />
[ 1279.659590] devm_devfreq_event_release+0x1c/0x28<br />
[ 1279.659602] release_nodes+0x1cc/0x244<br />
[ 1279.659611] devres_release_all+0x44/0x60<br />
[ 1279.659621] device_release_driver_internal+0x11c/0x1ac<br />
[ 1279.659629] device_driver_detach+0x20/0x2c<br />
[ 1279.659641] unbind_store+0x7c/0xb0<br />
[ 1279.659650] drv_attr_store+0x2c/0x40<br />
[ 1279.659663] sysfs_kf_write+0x44/0x58<br />
[ 1279.659672] kernfs_fop_write_iter+0xf4/0x190<br />
[ 1279.659684] vfs_write+0x2b0/0x2e4<br />
[ 1279.659693] ksys_write+0x80/0xec<br />
[ 1279.659701] __arm64_sys_write+0x24/0x30<br />
[ 1279.659714] el0_svc_common+0xf0/0x1d8<br />
[ 1279.659724] do_el0_svc_compat+0x28/0x3c<br />
[ 1279.659738] el0_svc_compat+0x10/0x1c<br />
[ 1279.659746] el0_sync_compat_handler+0xa8/0xcc<br />
[ 1279.659758] el0_sync_compat+0x188/0x1c0<br />
[ 1279.659768] ---[ end trace cec200e5094155b4 ]---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9 (including) | 4.19.247 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.121 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2fccf9e6050e0e3b8b4cd275d41daf7f7fa22804
- https://git.kernel.org/stable/c/664736e2cc09e504ce58ec61164d029d1f2651bb
- https://git.kernel.org/stable/c/86b091b6894c449d2734de7aa7d79ccb33ffd97d
- https://git.kernel.org/stable/c/a0180e324a9a63de8f770da300477b48cb4a53f1
- https://git.kernel.org/stable/c/a9c2b23a7ac6ab19214cad8cac8af8608a4d9cef
- https://git.kernel.org/stable/c/cb1be1d4be18fe286ba5a67d928598378fd7fbe5
- https://git.kernel.org/stable/c/fb089b6f21de03a685dd31df3789bbb01c59f8e3



