CVE-2022-49489

Source
https://cve.org/CVERecord?id=CVE-2022-49489
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49489.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49489
Downstream
Related
Published
2025-02-26T02:13:26.785Z
Modified
2026-04-11T12:44:08.275952Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume

BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3

Call trace: dpuvbifinitmemtypes+0x40/0xb8 dpuruntimeresume+0xcc/0x1c0 pmgenericruntimeresume+0x30/0x44 __genpdruntimeresume+0x68/0x7c genpdruntimeresume+0x134/0x258 __rpmcallback+0x98/0x138 rpmcallback+0x30/0x88 rpm_resume+0x36c/0x49c _pmruntimeresume+0x80/0xb0 dpucoreirquninstall+0x30/0xb0 dpuirquninstall+0x18/0x24 msmdrmuninit+0xd8/0x16c

Patchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49489.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef
Fixed
aa4cb188988dc6f1b3f4917d4dbc452150a5d871
Fixed
ef10d0c68e8608848cd58fca2589685718426607
Fixed
134760263f6441741db0b2970e7face6b34b6d1c
Fixed
ef4bdaac7cb5416f236613ed9337ff0ea8ee329b
Fixed
97ac682b6f7d36be5d934f86c9911066540a68f1
Fixed
5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2
Fixed
fa5186b279ecf44b14fb435540d2065be91cb1ed

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49489.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.121
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.46
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.14
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49489.json"