CVE-2022-49460

Source
https://cve.org/CVERecord?id=CVE-2022-49460
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49460.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49460
Downstream
Related
Published
2025-02-26T02:13:07.635Z
Modified
2026-03-20T12:24:33.312250Z
Summary
PM / devfreq: rk3399_dmc: Disable edev on remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: rk3399_dmc: Disable edev on remove()

Otherwise we hit an unablanced enable-count when unbinding the DFI device:

[ 1279.659119] ------------[ cut here ]------------ [ 1279.659179] WARNING: CPU: 2 PID: 5638 at drivers/devfreq/devfreq-event.c:360 devfreqeventremoveedev+0x84/0x8c ... [ 1279.659352] Hardware name: Google Kevin (DT) [ 1279.659363] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO BTYPE=--) [ 1279.659371] pc : devfreqeventremoveedev+0x84/0x8c [ 1279.659380] lr : devmdevfreqeventrelease+0x1c/0x28 ... [ 1279.659571] Call trace: [ 1279.659582] devfreqeventremoveedev+0x84/0x8c [ 1279.659590] devmdevfreqeventrelease+0x1c/0x28 [ 1279.659602] releasenodes+0x1cc/0x244 [ 1279.659611] devresreleaseall+0x44/0x60 [ 1279.659621] devicereleasedriverinternal+0x11c/0x1ac [ 1279.659629] devicedriverdetach+0x20/0x2c [ 1279.659641] unbindstore+0x7c/0xb0 [ 1279.659650] drvattrstore+0x2c/0x40 [ 1279.659663] sysfskfwrite+0x44/0x58 [ 1279.659672] kernfsfopwriteiter+0xf4/0x190 [ 1279.659684] vfswrite+0x2b0/0x2e4 [ 1279.659693] ksys_write+0x80/0xec [ 1279.659701] __arm64syswrite+0x24/0x30 [ 1279.659714] el0svccommon+0xf0/0x1d8 [ 1279.659724] doel0svccompat+0x28/0x3c [ 1279.659738] el0svccompat+0x10/0x1c [ 1279.659746] el0synccompathandler+0xa8/0xcc [ 1279.659758] el0synccompat+0x188/0x1c0 [ 1279.659768] ---[ end trace cec200e5094155b4 ]---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49460.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5a893e31a636cca3798af2db5aee8d3d144b1e1e
Fixed
664736e2cc09e504ce58ec61164d029d1f2651bb
Fixed
a0180e324a9a63de8f770da300477b48cb4a53f1
Fixed
86b091b6894c449d2734de7aa7d79ccb33ffd97d
Fixed
cb1be1d4be18fe286ba5a67d928598378fd7fbe5
Fixed
fb089b6f21de03a685dd31df3789bbb01c59f8e3
Fixed
a9c2b23a7ac6ab19214cad8cac8af8608a4d9cef
Fixed
2fccf9e6050e0e3b8b4cd275d41daf7f7fa22804

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49460.json"