vulnerability
Ubuntu: (CVE-2022-48843): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jul 16, 2024 | Nov 19, 2024 | Dec 30, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jul 16, 2024
Added
Nov 19, 2024
Modified
Dec 30, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vrr: Set VRR capable prop only if it is attached to connector
VRR capable property is not attached by default to the connector
It is attached only if VRR is supported.
So if the driver tries to call drm core set prop function without
it being attached that causes NULL dereference.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-4ubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-iotubuntu-upgrade-linux-kvmubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4ubuntu-upgrade-linux-realtime
References
- CVE-2022-48843
- https://attackerkb.com/topics/CVE-2022-48843
- URL-https://git.kernel.org/linus/62929726ef0ec72cbbe9440c5d125d4278b99894
- URL-https://git.kernel.org/stable/c/0ba557d330946c23559aaea2d51ea649fdeca98a
- URL-https://git.kernel.org/stable/c/3534c5c005ef99a1804ed50b8a72cdae254cabb5
- URL-https://git.kernel.org/stable/c/62929726ef0ec72cbbe9440c5d125d4278b99894
- URL-https://git.kernel.org/stable/c/85271e92ae4f13aa679acaa6cf76b3c36bcb7bab
- URL-https://git.kernel.org/stable/c/941e8bcd2b2ba95490738e33dfeca27168452779
- URL-https://www.cve.org/CVERecord?id=CVE-2022-48843
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.