
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49488 affects the Linux kernel's drm/msm/mdp5 component. The vulnerability was discovered when mdp5_get_global_state could return -EDEADLK when acquiring the modeset lock, but the global_state in mdp5_mixer_release didn't check for returned errors. This could lead to a NULL dereference error (Kernel Git).
The vulnerability exists in the mdp5_mixer_release function where it fails to properly check the return value from mdp5_get_global_state. When acquiring the modeset lock, mdp5_get_global_state can return -EDEADLK, but the code proceeds to use the global_state without verifying if an error was returned, potentially leading to a NULL pointer dereference (Kernel Git).
If exploited, this vulnerability could lead to a NULL pointer dereference in the kernel, potentially causing system crashes or denial of service conditions (Kernel Git).
The issue has been fixed by modifying mdp5_mixer_release to check for and properly handle error returns from mdp5_get_global_state. The fix includes propagating the error code when a deadlock is detected. Users should update to a patched version of the kernel that includes commit ca75f6f7c6f89365e40f10f641b15981b1f07c31 (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."