{"id":"CVE-2022-49490","summary":"drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected\n\nmdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring\nthe modeset lock, but currently mdp5_pipe_release doesn't check for if\nan error is returned. Because of this, there is a possibility of\nmdp5_pipe_release hitting a NULL dereference error.\n\nTo avoid this, let's have mdp5_pipe_release check if\nmdp5_get_global_state returns an error and propogate that error.\n\nChanges since v1:\n- Separated declaration and initialization of *new_state to avoid\n  compiler warning\n- Fixed some spelling mistakes in commit message\n\nChanges since v2:\n- Return 0 in case where hwpipe is NULL as this is considered normal\n  behavior\n- Added 2nd patch in series to fix a similar NULL dereference issue in\n  mdp5_mixer_release\n\nPatchwork: https://patchwork.freedesktop.org/patch/485179/","modified":"2026-04-02T08:27:38.014434Z","published":"2025-02-26T02:13:27.529Z","related":["SUSE-SU-2025:0834-1","SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49490.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04bef5f1ba8ea6d7c1c8f5f65e0395c62db59cb8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/19964dfb39bda4d7716a71009488f0668ecbcf52"},{"type":"WEB","url":"https://git.kernel.org/stable/c/33dc5aac46e0fad8f5eb193e5906ed0eb6b66ceb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49dc28b4b2e28ef7564e355c91487996c1cbebd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/776f5c58bfe16cf322d71eeed3c5dda1eeac7e6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b2aa2c4efe93e2580d6a8774b04fe2b99756a322"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d59be579fa932c46b908f37509f319cbd4ca9a68"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49490.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49490"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7907a0d77cb461f58045763c205a5830be72e97c"},{"fixed":"776f5c58bfe16cf322d71eeed3c5dda1eeac7e6b"},{"fixed":"b2aa2c4efe93e2580d6a8774b04fe2b99756a322"},{"fixed":"49dc28b4b2e28ef7564e355c91487996c1cbebd7"},{"fixed":"04bef5f1ba8ea6d7c1c8f5f65e0395c62db59cb8"},{"fixed":"19964dfb39bda4d7716a71009488f0668ecbcf52"},{"fixed":"33dc5aac46e0fad8f5eb193e5906ed0eb6b66ceb"},{"fixed":"d59be579fa932c46b908f37509f319cbd4ca9a68"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49490.json"}}],"schema_version":"1.7.5"}