CVE-2022-49488
📋 TL;DR
This vulnerability is a NULL pointer dereference in the Linux kernel's MSM DRM/MDP5 display driver. When a deadlock occurs while acquiring the modeset lock, the mdp5_mixer_release function fails to check for error codes, potentially leading to kernel crashes or denial of service. Systems using affected Linux kernel versions with MSM DRM/MDP5 display drivers are vulnerable.
💻 Affected Systems
- Linux kernel with MSM DRM/MDP5 display driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart the system.
Likely Case
System instability, display subsystem crashes, or application crashes when display operations encounter deadlock conditions.
If Mitigated
Minor performance impact from proper error handling with no security compromise.
🎯 Exploit Status
Requires local access and ability to trigger specific display subsystem operations that cause deadlock conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 09bdeedc1fc53e64b8282e1de67752c69e43bdba or later
Vendor Advisory: https://patchwork.freedesktop.org/patch/485181/
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable MSM DRM/MDP5 driver
linuxRemove or blacklist the affected display driver if not needed
echo 'blacklist msm' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
🧯 If You Can't Patch
- Restrict local user access to systems with affected hardware
- Monitor system logs for kernel panic or display subsystem errors
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if MSM DRM driver is loaded: 'uname -r' and 'lsmod | grep msm'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is after fix commits and check dmesg for no related errors
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference in dmesg
- Display subsystem crash logs
Network Indicators:
- None - local vulnerability
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "mdp5" OR "EDEADLK")
🔗 References
- https://git.kernel.org/stable/c/09bdeedc1fc53e64b8282e1de67752c69e43bdba
- https://git.kernel.org/stable/c/1a5d1474026ea4f1a6f931075ca2adb884af39cf
- https://git.kernel.org/stable/c/22d8424913b1348c6324916745fadaeea5273f0e
- https://git.kernel.org/stable/c/46e5ce63924a96af452c4fc5ee0bb3b241e1b9f4
- https://git.kernel.org/stable/c/47e393061049aff6818d1b9fdca7351411a23fc2
- https://git.kernel.org/stable/c/883f1d52a57bf51e1d7a80c432345e2c6222477e
- https://git.kernel.org/stable/c/ca75f6f7c6f89365e40f10f641b15981b1f07c31