Skip to main content

CVE-2022-48843: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48843cvecve-2022-48843
Published: Tue Jul 16 2024 (07/16/2024, 12:25:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vrr: Set VRR capable prop only if it is attached to connector VRR capable property is not attached by default to the connector It is attached only if VRR is supported. So if the driver tries to call drm core set prop function without it being attached that causes NULL dereference.

AI-Powered Analysis

AILast updated: 06/30/2025, 22:40:20 UTC

Technical Analysis

CVE-2022-48843 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the variable refresh rate (VRR) handling code. The issue arises in the drm/vrr component where the VRR capable property is set only if it is attached to a connector. The vulnerability occurs because the VRR capable property is not attached by default to the connector; it is only attached if VRR is supported by the hardware. If a driver attempts to call the drm core set property function without the VRR capable property being attached, this results in a NULL pointer dereference. This dereference can cause a kernel crash (kernel panic) or system instability, leading to a denial of service (DoS) condition. The vulnerability is rooted in improper validation and handling of the VRR capable property attachment state before invoking the set property function. Since this flaw is in the kernel's DRM subsystem, it affects Linux systems that use affected kernel versions containing the vulnerable code. The vulnerability does not require user interaction but does require the system to have hardware or drivers that attempt to set the VRR capable property incorrectly. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue has been publicly disclosed and patched in recent Linux kernel updates.

Potential Impact

For European organizations, the impact of CVE-2022-48843 primarily involves potential system instability or denial of service on Linux-based systems that utilize the DRM subsystem with VRR support. This could affect servers, workstations, or embedded devices running vulnerable Linux kernel versions, especially those with graphics hardware supporting VRR. Organizations relying on Linux for critical infrastructure, cloud services, or development environments may experience unexpected kernel crashes, leading to service interruptions and potential operational downtime. While this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting denial of service could disrupt business continuity, particularly in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted DoS attempts by malicious insiders or attackers with local access. The impact is more pronounced in environments where VRR-capable hardware is common and Linux kernel updates are delayed or infrequent.

Mitigation Recommendations

To mitigate CVE-2022-48843, European organizations should: 1) Prioritize updating Linux kernels to the latest patched versions where this vulnerability is resolved. Monitor vendor advisories and Linux kernel mailing lists for patches and backports relevant to their distributions. 2) Audit systems to identify those running affected kernel versions with VRR-capable hardware or drivers. 3) In environments where immediate patching is not feasible, consider disabling VRR support in the DRM subsystem or kernel module parameters as a temporary workaround to prevent the vulnerable code path from executing. 4) Implement robust monitoring to detect kernel crashes or system instability that may indicate exploitation attempts or triggering of this vulnerability. 5) Ensure that system users and administrators follow the principle of least privilege to limit local access that could be used to trigger the vulnerability. 6) Collaborate with hardware and driver vendors to confirm compatibility and support for patched kernel versions to avoid regression issues. These steps go beyond generic advice by emphasizing hardware-specific considerations and operational controls tailored to the nature of this kernel vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.910Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe6354

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 10:40:20 PM

Last updated: 8/11/2025, 6:17:37 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats