CVE-2022-49490

In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected mdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring the modeset lock, but currently mdp5_pipe_release doesn't check for if an error is returned. Because of this, there is a possibility of mdp5_pipe_release hitting a NULL dereference error. To avoid this, let's have mdp5_pipe_release check if mdp5_get_global_state returns an error and propogate that error. Changes since v1: - Separated declaration and initialization of *new_state to avoid compiler warning - Fixed some spelling mistakes in commit message Changes since v2: - Return 0 in case where hwpipe is NULL as this is considered normal behavior - Added 2nd patch in series to fix a similar NULL dereference issue in mdp5_mixer_release Patchwork: https://patchwork.freedesktop.org/patch/485179/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:20

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04bef5f1ba8ea6d7c1c8f5f65e0395c62db59cb8 - () https://git.kernel.org/stable/c/04bef5f1ba8ea6d7c1c8f5f65e0395c62db59cb8 - Patch
References () https://git.kernel.org/stable/c/19964dfb39bda4d7716a71009488f0668ecbcf52 - () https://git.kernel.org/stable/c/19964dfb39bda4d7716a71009488f0668ecbcf52 - Patch
References () https://git.kernel.org/stable/c/33dc5aac46e0fad8f5eb193e5906ed0eb6b66ceb - () https://git.kernel.org/stable/c/33dc5aac46e0fad8f5eb193e5906ed0eb6b66ceb - Patch
References () https://git.kernel.org/stable/c/49dc28b4b2e28ef7564e355c91487996c1cbebd7 - () https://git.kernel.org/stable/c/49dc28b4b2e28ef7564e355c91487996c1cbebd7 - Patch
References () https://git.kernel.org/stable/c/776f5c58bfe16cf322d71eeed3c5dda1eeac7e6b - () https://git.kernel.org/stable/c/776f5c58bfe16cf322d71eeed3c5dda1eeac7e6b - Patch
References () https://git.kernel.org/stable/c/b2aa2c4efe93e2580d6a8774b04fe2b99756a322 - () https://git.kernel.org/stable/c/b2aa2c4efe93e2580d6a8774b04fe2b99756a322 - Patch
References () https://git.kernel.org/stable/c/d59be579fa932c46b908f37509f319cbd4ca9a68 - () https://git.kernel.org/stable/c/d59be579fa932c46b908f37509f319cbd4ca9a68 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/mdp5: Devuelve un código de error en mdp5_pipe_release cuando se detecta un bloqueo mdp5_get_global_state corre el riesgo de alcanzar un -EDEADLK al adquirir el bloqueo modeset, pero actualmente mdp5_pipe_release no verifica si se devuelve un error. Debido a esto, existe la posibilidad de que mdp5_pipe_release alcance un error de desreferencia NULL. Para evitar esto, hagamos que mdp5_pipe_release verifique si mdp5_get_global_state devuelve un error y propague ese error. Cambios desde v1: - Declaración separada e inicialización de *new_state para evitar advertencias del compilador - Se corrigieron algunos errores ortográficos en el mensaje de confirmación Cambios desde v2: - Devuelve 0 en caso de que hwpipe sea NULL, ya que esto se considera un comportamiento normal - Se agregó el segundo parche en serie para corregir un problema de desreferencia NULL similar en mdp5_mixer_release Patchwork: https://patchwork.freedesktop.org/patch/485179/
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:20


NVD link : CVE-2022-49490

Mitre link : CVE-2022-49490

CVE.ORG link : CVE-2022-49490


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference