CVE-2022-49512

Source
https://cve.org/CVERecord?id=CVE-2022-49512
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49512.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49512
Downstream
Related
Published
2025-02-26T02:13:42.128Z
Modified
2026-03-12T03:25:19.012980Z
Summary
mtd: rawnand: denali: Use managed device resources
Details

In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: denali: Use managed device resources

All of the resources used by this driver has managed interfaces, so use them. Otherwise we will get the following splat:

[ 4.472703] denali-nand-pci 0000:00:05.0: timeout while waiting for irq 0x1000 [ 4.474071] denali-nand-pci: probe of 0000:00:05.0 failed with error -5 [ 4.473538] nand: No NAND device found [ 4.474068] BUG: unable to handle page fault for address: ffffc90005000410 [ 4.475169] #PF: supervisor write access in kernel mode [ 4.475579] #PF: errorcode(0x0002) - not-present page [ 4.478362] RIP: 0010:iowrite32+0x9/0x50 [ 4.486068] Call Trace: [ 4.486269] <IRQ> [ 4.486443] denaliisr+0x15b/0x300 [denali] [ 4.486788] ? denalidirectwrite+0x50/0x50 [denali] [ 4.487189] __handleirqevent_percpu+0x161/0x3b0 [ 4.487571] handleirqevent+0x7d/0x1b0 [ 4.487884] handlefasteoiirq+0x2b0/0x770 [ 4.488219] __commoninterrupt+0xc8/0x1b0 [ 4.488549] commoninterrupt+0x9a/0xc0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49512.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
93db446a424cee9387b532995e6b516667079555
Fixed
3c68daf4a368cd9e63ae5a2145c9e4a6f838c166
Fixed
3830dbdfb9a4aec680e43ed80b9f23db7a88eac9
Fixed
87149cf9186201a63f0e0b93d9fa93d480bcb771
Fixed
efea1dd176edd17c8252051b7de6957f06efc394
Fixed
3a745b51cddafade99aaea1b93aad31e9614e230

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49512.json"