CVE-2022-49483

Source
https://cve.org/CVERecord?id=CVE-2022-49483
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49483.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49483
Downstream
Related
Published
2025-02-26T02:13:22.779Z
Modified
2026-03-12T03:25:15.205677Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drm/msm/disp/dpu1: avoid clearing hw interrupts if hw_intr is null during drm uninit
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/disp/dpu1: avoid clearing hw interrupts if hw_intr is null during drm uninit

If edp modeset init is failed due to panel being not ready and probe defers during drm bind, avoid clearing irqs and dereference hwintr when hwintr is null.

BUG: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000

Call trace: dpucoreirquninstall+0x50/0xb0 dpuirquninstall+0x18/0x24 msmdrmuninit+0xd8/0x16c msmdrmbind+0x580/0x5fc trytobringup_master+0x168/0x1c0 __componentadd+0xb4/0x178 componentadd+0x1c/0x28 dpdisplayprobe+0x38c/0x400 platformprobe+0xb0/0xd0 reallyprobe+0xcc/0x2c8 __driverprobedevice+0xbc/0xe8 driverprobedevice+0x48/0xf0 __deviceattachdriver+0xa0/0xc8 busforeach_drv+0x8c/0xd8 _deviceattach+0xc4/0x150 deviceinitialprobe+0x1c/0x28

Changes in V2: - Update commit message and coreect fixes tag.

Patchwork: https://patchwork.freedesktop.org/patch/484430/

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49483.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f25f656608e3a54ac3e0747be415cf3d4a69cef8
Fixed
a7ca30c3a8b2e8bda65f2b922d382ac056be8aa4
Fixed
a800701429313149afde18d98821554fbfcb3164
Fixed
01013ba9bbddc62f7d011163cebfd7ed06bb698b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49483.json"