CVE-2022-49488

In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected There is a possibility for mdp5_get_global_state to return -EDEADLK when acquiring the modeset lock, but currently global_state in mdp5_mixer_release doesn't check for if an error is returned. To avoid a NULL dereference error, let's have mdp5_mixer_release check if an error is returned and propagate that error. Patchwork: https://patchwork.freedesktop.org/patch/485181/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:22

Type Values Removed Values Added
CWE CWE-476
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/mdp5: Devuelve un código de error en mdp5_mixer_release cuando se detecta un bloqueo Existe la posibilidad de que mdp5_get_global_state devuelva -EDEADLK al adquirir el bloqueo de modeset, pero actualmente global_state en mdp5_mixer_release no comprueba si se devuelve un error. Para evitar un error de desreferencia NULL, hagamos que mdp5_mixer_release compruebe si se devuelve un error y propague ese error. Patchwork: https://patchwork.freedesktop.org/patch/485181/
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/09bdeedc1fc53e64b8282e1de67752c69e43bdba - () https://git.kernel.org/stable/c/09bdeedc1fc53e64b8282e1de67752c69e43bdba - Patch
References () https://git.kernel.org/stable/c/1a5d1474026ea4f1a6f931075ca2adb884af39cf - () https://git.kernel.org/stable/c/1a5d1474026ea4f1a6f931075ca2adb884af39cf - Patch
References () https://git.kernel.org/stable/c/22d8424913b1348c6324916745fadaeea5273f0e - () https://git.kernel.org/stable/c/22d8424913b1348c6324916745fadaeea5273f0e - Patch
References () https://git.kernel.org/stable/c/46e5ce63924a96af452c4fc5ee0bb3b241e1b9f4 - () https://git.kernel.org/stable/c/46e5ce63924a96af452c4fc5ee0bb3b241e1b9f4 - Patch
References () https://git.kernel.org/stable/c/47e393061049aff6818d1b9fdca7351411a23fc2 - () https://git.kernel.org/stable/c/47e393061049aff6818d1b9fdca7351411a23fc2 - Patch
References () https://git.kernel.org/stable/c/883f1d52a57bf51e1d7a80c432345e2c6222477e - () https://git.kernel.org/stable/c/883f1d52a57bf51e1d7a80c432345e2c6222477e - Patch
References () https://git.kernel.org/stable/c/ca75f6f7c6f89365e40f10f641b15981b1f07c31 - () https://git.kernel.org/stable/c/ca75f6f7c6f89365e40f10f641b15981b1f07c31 - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:22


NVD link : CVE-2022-49488

Mitre link : CVE-2022-49488

CVE.ORG link : CVE-2022-49488


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference