
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48891 affects the Linux kernel's regulator subsystem, specifically the da9211 driver. The vulnerability was discovered and disclosed on August 21, 2024. The issue occurs when the system does not come from reset (such as during kexec()), where the regulator might have an IRQ waiting before its structures are ready, leading to a crash (NVD).
The vulnerability manifests as a kernel crash due to attempting to read from unreadable memory at virtual address 0x0000000000000078. This occurs because the IRQ handler is enabled before its structures are properly initialized. The issue has a CVSS v3.1 Base Score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause a system crash through an unreadable memory access, leading to a denial of service condition. The issue specifically affects systems using the da9211 regulator driver, particularly during non-standard boot sequences like kexec() (Kernel Patch).
The issue has been fixed by reordering the initialization sequence in the da9211 driver. The patch ensures that the regulator is properly initialized before enabling the IRQ handler. The fix has been implemented in multiple kernel versions through various stable tree commits (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."