CVE-2022-50398
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.17 (inc) to 6.0.7 (exc) |
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | 6.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's DRM (Direct Rendering Manager) subsystem, specifically in the msm/dp (display port) driver. It happens when a user space display manager issues an extra screen update immediately followed by closing the DRM device while the downstream display interface is disabled. This extra update times out but incorrectly sets the crtc->active flag. As a result, when drm_release() calls commit_tails(), it incorrectly passes checks and calls dp_bridge_disable(), which tries to access hardware registers while the main link clocks are disabled, causing a crash. The patch adds an atomic_check to prevent pushing extra frames when the display interface is down, avoiding the incorrect setting of crtc->active and preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause a system crash (kernel panic) when the display manager issues an extra screen update followed by closing the DRM device while the downstream display interface is disabled. The crash occurs because the driver tries to disable hardware components that are already disabled, leading to invalid hardware access. This can result in system instability, loss of display functionality, and potential data loss if the crash happens unexpectedly.