CVE-2022-49489

Source
https://cve.org/CVERecord?id=CVE-2022-49489
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49489.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49489
Downstream
Related
Published
2025-02-26T02:13:26.785Z
Modified
2026-03-12T03:25:17.384595Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume

BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3

Call trace: dpuvbifinitmemtypes+0x40/0xb8 dpuruntimeresume+0xcc/0x1c0 pmgenericruntimeresume+0x30/0x44 __genpdruntimeresume+0x68/0x7c genpdruntimeresume+0x134/0x258 __rpmcallback+0x98/0x138 rpmcallback+0x30/0x88 rpm_resume+0x36c/0x49c _pmruntimeresume+0x80/0xb0 dpucoreirquninstall+0x30/0xb0 dpuirquninstall+0x18/0x24 msmdrmuninit+0xd8/0x16c

Patchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49489.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef
Fixed
aa4cb188988dc6f1b3f4917d4dbc452150a5d871
Fixed
ef10d0c68e8608848cd58fca2589685718426607
Fixed
134760263f6441741db0b2970e7face6b34b6d1c
Fixed
ef4bdaac7cb5416f236613ed9337ff0ea8ee329b
Fixed
97ac682b6f7d36be5d934f86c9911066540a68f1
Fixed
5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2
Fixed
fa5186b279ecf44b14fb435540d2065be91cb1ed

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49489.json"