{"id":"CVE-2022-49488","summary":"drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected\n\nThere is a possibility for mdp5_get_global_state to return\n-EDEADLK when acquiring the modeset lock, but currently global_state in\nmdp5_mixer_release doesn't check for if an error is returned.\n\nTo avoid a NULL dereference error, let's have mdp5_mixer_release\ncheck if an error is returned and propagate that error.\n\nPatchwork: https://patchwork.freedesktop.org/patch/485181/","modified":"2026-04-11T12:44:06.877967Z","published":"2025-02-26T02:13:26.116Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1","SUSE-SU-2025:1293-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49488.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/09bdeedc1fc53e64b8282e1de67752c69e43bdba"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a5d1474026ea4f1a6f931075ca2adb884af39cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/22d8424913b1348c6324916745fadaeea5273f0e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46e5ce63924a96af452c4fc5ee0bb3b241e1b9f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/47e393061049aff6818d1b9fdca7351411a23fc2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/883f1d52a57bf51e1d7a80c432345e2c6222477e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca75f6f7c6f89365e40f10f641b15981b1f07c31"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49488.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49488"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7907a0d77cb461f58045763c205a5830be72e97c"},{"fixed":"1a5d1474026ea4f1a6f931075ca2adb884af39cf"},{"fixed":"22d8424913b1348c6324916745fadaeea5273f0e"},{"fixed":"883f1d52a57bf51e1d7a80c432345e2c6222477e"},{"fixed":"09bdeedc1fc53e64b8282e1de67752c69e43bdba"},{"fixed":"47e393061049aff6818d1b9fdca7351411a23fc2"},{"fixed":"46e5ce63924a96af452c4fc5ee0bb3b241e1b9f4"},{"fixed":"ca75f6f7c6f89365e40f10f641b15981b1f07c31"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49488.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.18.0"},{"fixed":"4.19.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.46"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.17.14"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.18.0"},{"fixed":"5.18.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49488.json"}}],"schema_version":"1.7.5"}