๐Ÿ” CVE Alert

CVE-2022-49489

HIGH 7.8

drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume BUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3 Call trace: dpu_vbif_init_memtypes+0x40/0xb8 dpu_runtime_resume+0xcc/0x1c0 pm_generic_runtime_resume+0x30/0x44 __genpd_runtime_resume+0x68/0x7c genpd_runtime_resume+0x134/0x258 __rpm_callback+0x98/0x138 rpm_callback+0x30/0x88 rpm_resume+0x36c/0x49c __pm_runtime_resume+0x80/0xb0 dpu_core_irq_uninstall+0x30/0xb0 dpu_irq_uninstall+0x18/0x24 msm_drm_uninit+0xd8/0x16c Patchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < aa4cb188988dc6f1b3f4917d4dbc452150a5d871 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < ef10d0c68e8608848cd58fca2589685718426607 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < 134760263f6441741db0b2970e7face6b34b6d1c 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < ef4bdaac7cb5416f236613ed9337ff0ea8ee329b 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < 97ac682b6f7d36be5d934f86c9911066540a68f1 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < 5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2 25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef < fa5186b279ecf44b14fb435540d2065be91cb1ed
Linux / Linux
4.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/aa4cb188988dc6f1b3f4917d4dbc452150a5d871 git.kernel.org: https://git.kernel.org/stable/c/ef10d0c68e8608848cd58fca2589685718426607 git.kernel.org: https://git.kernel.org/stable/c/134760263f6441741db0b2970e7face6b34b6d1c git.kernel.org: https://git.kernel.org/stable/c/ef4bdaac7cb5416f236613ed9337ff0ea8ee329b git.kernel.org: https://git.kernel.org/stable/c/97ac682b6f7d36be5d934f86c9911066540a68f1 git.kernel.org: https://git.kernel.org/stable/c/5b0adf5cbf3b74721e4e4c4e0cadc91b8df8bcc2 git.kernel.org: https://git.kernel.org/stable/c/fa5186b279ecf44b14fb435540d2065be91cb1ed