CVE-2022-49460

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49460
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49460.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49460
Related
Published
2025-02-26T07:01:22Z
Modified
2025-02-26T19:01:25.966620Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: rk3399_dmc: Disable edev on remove()

Otherwise we hit an unablanced enable-count when unbinding the DFI device:

[ 1279.659119] ------------[ cut here ]------------ [ 1279.659179] WARNING: CPU: 2 PID: 5638 at drivers/devfreq/devfreq-event.c:360 devfreqeventremoveedev+0x84/0x8c ... [ 1279.659352] Hardware name: Google Kevin (DT) [ 1279.659363] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO BTYPE=--) [ 1279.659371] pc : devfreqeventremoveedev+0x84/0x8c [ 1279.659380] lr : devmdevfreqeventrelease+0x1c/0x28 ... [ 1279.659571] Call trace: [ 1279.659582] devfreqeventremoveedev+0x84/0x8c [ 1279.659590] devmdevfreqeventrelease+0x1c/0x28 [ 1279.659602] releasenodes+0x1cc/0x244 [ 1279.659611] devresreleaseall+0x44/0x60 [ 1279.659621] devicereleasedriverinternal+0x11c/0x1ac [ 1279.659629] devicedriverdetach+0x20/0x2c [ 1279.659641] unbindstore+0x7c/0xb0 [ 1279.659650] drvattrstore+0x2c/0x40 [ 1279.659663] sysfskfwrite+0x44/0x58 [ 1279.659672] kernfsfopwriteiter+0xf4/0x190 [ 1279.659684] vfswrite+0x2b0/0x2e4 [ 1279.659693] ksyswrite+0x80/0xec [ 1279.659701] _arm64syswrite+0x24/0x30 [ 1279.659714] el0svccommon+0xf0/0x1d8 [ 1279.659724] doel0svccompat+0x28/0x3c [ 1279.659738] el0svccompat+0x10/0x1c [ 1279.659746] el0synccompathandler+0xa8/0xcc [ 1279.659758] el0synccompat+0x188/0x1c0 [ 1279.659768] ---[ end trace cec200e5094155b4 ]---

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.127-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}