In the Linux kernel, the following vulnerability has been resolved:
drm/msm/mdp5: Return error code in mdp5mixerrelease when deadlock is detected
There is a possibility for mdp5getglobalstate to return -EDEADLK when acquiring the modeset lock, but currently globalstate in mdp5mixerrelease doesn't check for if an error is returned.
To avoid a NULL dereference error, let's have mdp5mixerrelease check if an error is returned and propagate that error.
Patchwork: https://patchwork.freedesktop.org/patch/485181/
[
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"276078147580920838569088259221084635807",
"28055974019766159767678335159890976982",
"247610864942368027755714624249799561982",
"117561651602677290444144287295779477056",
"326580031416675319248189527055751195061",
"300452814973313502979396374596598426066",
"117673836198965493518645537697259689486",
"303833592324290859521832327389587593072",
"24501425286829819690295319876596965186",
"173760790053212907318115469487592015195",
"194287024392070757340440294387430415979",
"339383972867289979635138864196462895646",
"116525208099770223088874587487734598332",
"161493550292168607756447853886261978239"
]
},
"id": "CVE-2022-49488-01f3fff3",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@883f1d52a57bf51e1d7a80c432345e2c6222477e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_crtc.c",
"function": "mdp5_crtc_setup_pipeline"
},
"digest": {
"function_hash": "204209910019970919932105980123997023518",
"length": 1050.0
},
"id": "CVE-2022-49488-1305418a",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a5d1474026ea4f1a6f931075ca2adb884af39cf",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"251273190925027464171710590096574937142",
"79402319781893782051505217280317150119",
"54003644325964847325231747800170544381"
]
},
"id": "CVE-2022-49488-242afd01",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a5d1474026ea4f1a6f931075ca2adb884af39cf",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_crtc.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"264849259167570271700941187851133261010",
"206685319345605208055029935061501188989",
"276768684116799953914293787492226135353",
"202855859260505879005317592548760553500",
"41150234132113867926308928295697140704",
"232760773153175850488574942396250917400"
]
},
"id": "CVE-2022-49488-32a7e555",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@883f1d52a57bf51e1d7a80c432345e2c6222477e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.c",
"function": "mdp5_mixer_release"
},
"digest": {
"function_hash": "180394790661493985572266732663816184501",
"length": 372.0
},
"id": "CVE-2022-49488-95596c80",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a5d1474026ea4f1a6f931075ca2adb884af39cf",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"251273190925027464171710590096574937142",
"79402319781893782051505217280317150119",
"54003644325964847325231747800170544381"
]
},
"id": "CVE-2022-49488-b98bbe38",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@883f1d52a57bf51e1d7a80c432345e2c6222477e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_crtc.c",
"function": "mdp5_crtc_setup_pipeline"
},
"digest": {
"function_hash": "204209910019970919932105980123997023518",
"length": 1050.0
},
"id": "CVE-2022-49488-bc93bf13",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@883f1d52a57bf51e1d7a80c432345e2c6222477e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.c",
"function": "mdp5_mixer_release"
},
"digest": {
"function_hash": "180394790661493985572266732663816184501",
"length": 372.0
},
"id": "CVE-2022-49488-be62a3d4",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@883f1d52a57bf51e1d7a80c432345e2c6222477e",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_crtc.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"264849259167570271700941187851133261010",
"206685319345605208055029935061501188989",
"276768684116799953914293787492226135353",
"202855859260505879005317592548760553500",
"41150234132113867926308928295697140704",
"232760773153175850488574942396250917400"
]
},
"id": "CVE-2022-49488-db470344",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a5d1474026ea4f1a6f931075ca2adb884af39cf",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/msm/disp/mdp5/mdp5_mixer.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"276078147580920838569088259221084635807",
"28055974019766159767678335159890976982",
"247610864942368027755714624249799561982",
"117561651602677290444144287295779477056",
"326580031416675319248189527055751195061",
"300452814973313502979396374596598426066",
"117673836198965493518645537697259689486",
"303833592324290859521832327389587593072",
"24501425286829819690295319876596965186",
"173760790053212907318115469487592015195",
"194287024392070757340440294387430415979",
"339383972867289979635138864196462895646",
"116525208099770223088874587487734598332",
"161493550292168607756447853886261978239"
]
},
"id": "CVE-2022-49488-e188a650",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a5d1474026ea4f1a6f931075ca2adb884af39cf",
"signature_version": "v1"
}
]