
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49489 affects the Linux kernel's DPU (Display Processing Unit) driver for MSM platforms. The vulnerability was discovered in the handling of VBIF (Virtual Bus Interface) hardware configuration during power management runtime resume operations. The issue stems from a use-after-free condition in the DPU driver when the VBIF hardware configuration is accessed after being freed during power management operations (Kernel Git).
The vulnerability occurs in the DPU driver's runtime resume path where the VBIF hardware configuration is accessed after being freed. This leads to a kernel paging request at virtual address 006b6b6b6b6b6be3, causing a system crash. The issue manifests in the call trace through dpuvbifinit_memtypes during runtime resume operations, specifically when the system attempts to access the freed VBIF configuration (Kernel Git).
When exploited, this vulnerability can lead to a kernel crash due to invalid memory access, potentially causing system instability and denial of service. The issue occurs during power management operations, specifically during runtime resume, which could affect system reliability and availability (Kernel Git).
The issue has been fixed by setting the VBIF hardware configuration pointer to NULL after destroying it, preventing subsequent use-after-free scenarios. The fix was implemented in commit fa5186b279ecf44b14fb435540d2065be91cb1ed and backported to various stable kernel versions (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."