vulnerability
Ubuntu: (CVE-2022-49489): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Feb 26, 2025 | Mar 3, 2025 | Jun 12, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume
BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3
Call trace:
dpu_vbif_init_memtypes+0x40/0xb8
dpu_runtime_resume+0xcc/0x1c0
pm_generic_runtime_resume+0x30/0x44
__genpd_runtime_resume+0x68/0x7c
genpd_runtime_resume+0x134/0x258
__rpm_callback+0x98/0x138
rpm_callback+0x30/0x88
rpm_resume+0x36c/0x49c
__pm_runtime_resume+0x80/0xb0
dpu_core_irq_uninstall+0x30/0xb0
dpu_irq_uninstall+0x18/0x24
msm_drm_uninit+0xd8/0x16c
Patchwork: https://patchwork.freedesktop.org/patch/483255/
[DB: fixed Fixes tag]
Solution(s)
References
- CVE-2022-49489
- https://attackerkb.com/topics/CVE-2022-49489
- URL-https://git.kernel.org/linus/fa5186b279ecf44b14fb435540d2065be91cb1ed
- URL-https://git.kernel.org/stable/c/134760263f6441741db0b2970e7face6b34b6d1c
- URL-https://git.kernel.org/stable/c/5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2
- URL-https://git.kernel.org/stable/c/97ac682b6f7d36be5d934f86c9911066540a68f1
- URL-https://git.kernel.org/stable/c/aa4cb188988dc6f1b3f4917d4dbc452150a5d871
- URL-https://git.kernel.org/stable/c/ef10d0c68e8608848cd58fca2589685718426607
- URL-https://git.kernel.org/stable/c/ef4bdaac7cb5416f236613ed9337ff0ea8ee329b
- URL-https://git.kernel.org/stable/c/fa5186b279ecf44b14fb435540d2065be91cb1ed
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49489

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.