CVE-2022-48898

Source
https://cve.org/CVERecord?id=CVE-2022-48898
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48898.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48898
Downstream
Related
Published
2024-08-21T06:10:30.879Z
Modified
2026-03-20T12:21:59.303706Z
Summary
drm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux transfer
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dp: do not complete dpauxcmdfifotx() if irq is not for aux transfer

There are 3 possible interrupt sources are handled by DP controller, HPDstatus, Controller state changes and Aux read/write transaction. At every irq, DP controller have to check isr status of every interrupt sources and service the interrupt if its isr status bits shows interrupts are pending. There is potential race condition may happen at current aux isr handler implementation since it is always complete dpauxcmdfifotx() even irq is not for aux read or write transaction. This may cause aux read transaction return premature if host aux data read is in the middle of waiting for sink to complete transferring data to host while irq happen. This will cause host's receiving buffer contains unexpected data. This patch fixes this problem by checking aux isr and return immediately at aux isr handler if there are no any isr status bits set.

Current there is a bug report regrading eDP edid corruption happen during system booting up. After lengthy debugging to found that VIDEOREADY interrupt was continuously firing during system booting up which cause dpauxisr() to complete dpauxcmdfifo_tx() prematurely to retrieve data from aux hardware buffer which is not yet contains complete data transfer from sink. This cause edid corruption.

Follows are the signature at kernel logs when problem happen, EDID has corrupt header panel-simple-dp-aux aux-aea0000.edp: Couldn't identify panel via EDID

Changes in v2: -- do complete if (ret == IRQHANDLED) ay dp-auxisr() -- add more commit text

Changes in v3: -- add Stephen suggested -- dpauxisr() return IRQXXX back to caller -- dpctrlisr() return IRQXXX back to caller

Changes in v4: -- split into two patches

Changes in v5: -- delete empty line between tags

Changes in v6: -- remove extra "that" and fixed line more than 75 char at commit text

Patchwork: https://patchwork.freedesktop.org/patch/516121/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48898.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c943b4948b5848fc0e07f875edbd35a973879e22
Fixed
785607e5e6fb52caf141e4580de40405565f04f1
Fixed
984ad875db804948c86ca9e1c2e784ae8252715a
Fixed
b7dcbca46db3c77fdb02c2a9d6239e5aa3b06a59
Fixed
1cba0d150fa102439114a91b3e215909efc9f169

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48898.json"