First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected mdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring the modeset lock, but currently mdp5_pipe_release doesn't check for if an error is returned. Because of this, there is a possibility of mdp5_pipe_release hitting a NULL dereference error. To avoid this, let's have mdp5_pipe_release check if mdp5_get_global_state returns an error and propogate that error. Changes since v1: - Separated declaration and initialization of *new_state to avoid compiler warning - Fixed some spelling mistakes in commit message Changes since v2: - Return 0 in case where hwpipe is NULL as this is considered normal behavior - Added 2nd patch in series to fix a similar NULL dereference issue in mdp5_mixer_release Patchwork: https://patchwork.freedesktop.org/patch/485179/
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49490 has a medium severity rating due to the potential for deadlock situations in the Linux kernel.
To fix CVE-2022-49490, update to the latest stable version of the Linux kernel where the vulnerability has been resolved.
CVE-2022-49490 affects the Linux kernel, particularly in environments using the drm/msm/mdp5 video subsystem.
The implications of CVE-2022-49490 include potential system deadlock, which may affect system stability.
Yes, CVE-2022-49490 has been resolved in subsequent updates to the Linux kernel.