Skip to main content

CVE-2022-48826: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48826cvecve-2022-48826
Published: Tue Jul 16 2024 (07/16/2024, 11:44:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Fix deadlock on DSI device attach error DSI device attach to DSI host will be done with host device's lock held. Un-registering host in "device attach" error path (ex: probe retry) will result in deadlock with below call trace and non operational DSI display. Startup Call trace: [ 35.043036] rt_mutex_slowlock.constprop.21+0x184/0x1b8 [ 35.043048] mutex_lock_nested+0x7c/0xc8 [ 35.043060] device_del+0x4c/0x3e8 [ 35.043075] device_unregister+0x20/0x40 [ 35.043082] mipi_dsi_remove_device_fn+0x18/0x28 [ 35.043093] device_for_each_child+0x68/0xb0 [ 35.043105] mipi_dsi_host_unregister+0x40/0x90 [ 35.043115] vc4_dsi_host_attach+0xf0/0x120 [vc4] [ 35.043199] mipi_dsi_attach+0x30/0x48 [ 35.043209] tc358762_probe+0x128/0x164 [tc358762] [ 35.043225] mipi_dsi_drv_probe+0x28/0x38 [ 35.043234] really_probe+0xc0/0x318 [ 35.043244] __driver_probe_device+0x80/0xe8 [ 35.043254] driver_probe_device+0xb8/0x118 [ 35.043263] __device_attach_driver+0x98/0xe8 [ 35.043273] bus_for_each_drv+0x84/0xd8 [ 35.043281] __device_attach+0xf0/0x150 [ 35.043290] device_initial_probe+0x1c/0x28 [ 35.043300] bus_probe_device+0xa4/0xb0 [ 35.043308] deferred_probe_work_func+0xa0/0xe0 [ 35.043318] process_one_work+0x254/0x700 [ 35.043330] worker_thread+0x4c/0x448 [ 35.043339] kthread+0x19c/0x1a8 [ 35.043348] ret_from_fork+0x10/0x20 Shutdown Call trace: [ 365.565417] Call trace: [ 365.565423] __switch_to+0x148/0x200 [ 365.565452] __schedule+0x340/0x9c8 [ 365.565467] schedule+0x48/0x110 [ 365.565479] schedule_timeout+0x3b0/0x448 [ 365.565496] wait_for_completion+0xac/0x138 [ 365.565509] __flush_work+0x218/0x4e0 [ 365.565523] flush_work+0x1c/0x28 [ 365.565536] wait_for_device_probe+0x68/0x158 [ 365.565550] device_shutdown+0x24/0x348 [ 365.565561] kernel_restart_prepare+0x40/0x50 [ 365.565578] kernel_restart+0x20/0x70 [ 365.565591] __do_sys_reboot+0x10c/0x220 [ 365.565605] __arm64_sys_reboot+0x2c/0x38 [ 365.565619] invoke_syscall+0x4c/0x110 [ 365.565634] el0_svc_common.constprop.3+0xfc/0x120 [ 365.565648] do_el0_svc+0x2c/0x90 [ 365.565661] el0_svc+0x4c/0xf0 [ 365.565671] el0t_64_sync_handler+0x90/0xb8 [ 365.565682] el0t_64_sync+0x180/0x184

AI-Powered Analysis

AILast updated: 06/30/2025, 22:25:38 UTC

Technical Analysis

CVE-2022-48826 is a vulnerability identified in the Linux kernel specifically affecting the Direct Rendering Manager (DRM) vc4 driver, which handles display interfaces using the MIPI DSI (Display Serial Interface) protocol. The flaw arises during the device attach process of a DSI device to its host, where the host device's lock is held. If an error occurs during this attachment (for example, a probe retry failure), the host device is unregistered while still holding the lock, leading to a deadlock condition. This deadlock manifests as a system hang or freeze related to the DSI display subsystem, rendering the display non-operational. The provided kernel call traces illustrate the deadlock occurring both at system startup and shutdown, involving mutex locks and device unregistering functions. The issue is rooted in improper lock handling and error path management in the vc4 DSI host attach code, causing the kernel to stall indefinitely when the error path is triggered. This vulnerability does not appear to have any known exploits in the wild yet and no CVSS score has been assigned. It primarily affects Linux kernel versions containing the vulnerable commit hashes referenced. The impact is localized to systems using the vc4 DRM driver with MIPI DSI displays, which are common in embedded ARM-based devices such as Raspberry Pi and similar single-board computers. The vulnerability can cause system instability, denial of service due to deadlocks, and loss of display functionality, which could disrupt operations relying on graphical output or embedded systems with display interfaces.

Potential Impact

For European organizations, the impact of CVE-2022-48826 depends largely on the deployment of Linux-based embedded systems or devices using the vc4 DRM driver with MIPI DSI displays. Industries such as manufacturing, automotive, digital signage, IoT deployments, and telecommunications that utilize ARM-based Linux devices with graphical interfaces could experience operational disruptions. A deadlock in the display subsystem could cause critical embedded devices to freeze or become unresponsive, leading to downtime or degraded service. In sectors like healthcare or industrial automation, where embedded Linux devices may be used for monitoring or control, this could pose safety and reliability risks. Although the vulnerability does not directly expose data confidentiality or integrity, the denial of service and system instability could indirectly affect business continuity and operational efficiency. Since the vulnerability requires triggering an error during device attachment, it may be less likely to be exploited remotely but could be triggered by faulty hardware, driver bugs, or malicious local activity. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or intentional triggering of the deadlock.

Mitigation Recommendations

To mitigate CVE-2022-48826, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that the vc4 DRM driver and related MIPI DSI components are updated. 2) Conduct thorough testing of embedded Linux devices, especially those using ARM-based platforms with graphical displays, to detect any deadlock or freeze conditions during device initialization or shutdown. 3) Implement monitoring solutions that can detect system hangs or unresponsive display subsystems and trigger automated recovery procedures such as watchdog timers or forced reboots. 4) Limit local access to embedded devices to trusted personnel to reduce the risk of intentional triggering of the deadlock. 5) For critical systems, consider fallback mechanisms that allow remote management or console access even if the graphical interface becomes unresponsive. 6) Maintain an inventory of devices using the affected Linux kernel versions and the vc4 DRM driver to prioritize patching and risk assessment. 7) Collaborate with device vendors to ensure timely firmware and driver updates are provided and deployed. These steps go beyond generic advice by focusing on embedded device management, monitoring for deadlocks, and operational continuity strategies specific to the affected subsystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.903Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe62c7

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 10:25:38 PM

Last updated: 7/31/2025, 12:01:38 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats