Skip to main content

CVE-2022-49483: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49483cvecve-2022-49483
Published: Wed Feb 26 2025 (02/26/2025, 02:13:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/disp/dpu1: avoid clearing hw interrupts if hw_intr is null during drm uninit If edp modeset init is failed due to panel being not ready and probe defers during drm bind, avoid clearing irqs and dereference hw_intr when hw_intr is null. BUG: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: dpu_core_irq_uninstall+0x50/0xb0 dpu_irq_uninstall+0x18/0x24 msm_drm_uninit+0xd8/0x16c msm_drm_bind+0x580/0x5fc try_to_bring_up_master+0x168/0x1c0 __component_add+0xb4/0x178 component_add+0x1c/0x28 dp_display_probe+0x38c/0x400 platform_probe+0xb0/0xd0 really_probe+0xcc/0x2c8 __driver_probe_device+0xbc/0xe8 driver_probe_device+0x48/0xf0 __device_attach_driver+0xa0/0xc8 bus_for_each_drv+0x8c/0xd8 __device_attach+0xc4/0x150 device_initial_probe+0x1c/0x28 Changes in V2: - Update commit message and coreect fixes tag. Patchwork: https://patchwork.freedesktop.org/patch/484430/

AI-Powered Analysis

AILast updated: 06/30/2025, 16:27:04 UTC

Technical Analysis

CVE-2022-49483 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for the MSM (Mobile Station Modem) driver, which handles display processing units (DPU1). The flaw arises in the drm/msm/disp/dpu1 code path during the uninitialization process of the DRM driver. When the eDP (embedded DisplayPort) modeset initialization fails because the panel is not ready, and the probe defers during the DRM bind phase, the code improperly attempts to clear hardware interrupts and dereference a null pointer (hw_intr). This results in a kernel NULL pointer dereference at virtual address 0x0, causing a kernel panic or system crash. The call trace indicates the failure occurs during irq uninstall and DRM uninitialization routines, which are critical for proper hardware interrupt management and device driver lifecycle. The vulnerability is rooted in insufficient null checks before dereferencing pointers during error handling in the driver probe and bind sequence. The patch resolves this by adding appropriate checks to avoid clearing interrupts or dereferencing hw_intr when it is null, preventing the kernel crash. This vulnerability affects specific Linux kernel versions identified by the commit hash f25f656608e3a54ac3e0747be415cf3d4a69cef8 and related builds. No known exploits are reported in the wild as of now, and no CVSS score has been assigned. The vulnerability is technical and low-level, impacting kernel stability and availability rather than confidentiality or integrity directly.

Potential Impact

For European organizations, this vulnerability primarily threatens system availability and stability on Linux systems using the affected MSM DRM drivers, which are common in mobile and embedded devices, including smartphones, tablets, and some IoT devices. Organizations relying on Linux-based infrastructure with affected kernels could experience unexpected system crashes or denial of service conditions if the vulnerability is triggered. This could disrupt business operations, especially in environments where uptime and reliability are critical, such as telecommunications, industrial control systems, and embedded device deployments. While the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting kernel panic could be exploited by attackers to cause denial of service or to facilitate further attacks by destabilizing systems. European entities with large deployments of Linux-based mobile or embedded devices, or those using custom Linux kernels with the MSM DRM driver, are at higher risk. The impact is more pronounced in sectors where device availability is critical, such as healthcare, manufacturing, and critical infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that address CVE-2022-49483 as soon as they are available and tested in their environments. This involves updating to kernel versions that include the fix or backporting the patch for custom kernels. 2) Conduct an inventory of devices and systems using the MSM DRM driver, particularly embedded and mobile devices running Linux kernels with the affected commit hashes, to identify vulnerable assets. 3) Implement robust monitoring and alerting for kernel panics or unexpected reboots that could indicate exploitation attempts or triggering of this vulnerability. 4) For critical systems, consider isolating or restricting access to vulnerable devices until patches are applied to prevent remote or local triggering of the flaw. 5) Engage with device vendors and Linux distribution maintainers to ensure timely updates and support for affected hardware. 6) Harden device configurations to limit untrusted code execution and restrict user privileges, reducing the risk of malicious triggering of the vulnerability. 7) Test patches in staging environments to ensure stability and compatibility before wide deployment, minimizing operational disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.582Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5ba8

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 4:27:04 PM

Last updated: 7/26/2025, 11:04:57 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats