![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-48633 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
drm/gma500: Fix WARN_ON(lock->magic != lock) error psb_gem_unpin()
calls dma_resv_lock() but the underlying ww_mutex gets destroyed by
drm_gem_object_release() move the drm_gem_object_release() call in
psb_gem_free_object() to after the unpin to fix the below warning: [
79.693962] ------------[ cut here ]------------ [ 79.693992]
DEBUG_LOCKS_WARN_ON(lock->magic != lock) [ 79.694015] WARNING: CPU: 0
PID: 240 at kernel/locking/mutex.c:582
__ww_mutex_lock.constprop.0+0x569/0xfb0 [ 79.694052] Modules linked
in: rfcomm snd_seq_dummy snd_hrtimer qrtr bnep ath9k ath9k_common
ath9k_hw snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio
snd_hda_codec_hdmi snd_hda_intel ath3k snd_intel_dspcfg mac80211
snd_intel_sdw_acpi btusb snd_hda_codec btrtl btbcm btintel btmtk
bluetooth at24 snd_hda_core snd_hwdep uvcvideo snd_seq libarc4
videobuf2_vmalloc ath videobuf2_memops videobuf2_v4l2 videobuf2_common
snd_seq_device videodev acer_wmi intel_powerclamp coretemp mc snd_pcm
joydev sparse_keymap ecdh_generic pcspkr wmi_bmof cfg80211 i2c_i801
i2c_smbus snd_timer snd r8169 rfkill lpc_ich soundcore acpi_cpufreq
zram rtsx_pci_sdmmc mmc_core serio_raw rtsx_pci gma500_gfx(E) video
wmi ip6_tables ip_tables i2c_dev fuse [ 79.694436] CPU: 0 PID: 240
Comm: plymouthd Tainted: G W E 6.0.0-rc3+ #490 [ 79.694457] Hardware
name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013 [ 79.694469]
RIP: 0010:__ww_mutex_lock.constprop.0+0x569/0xfb0 [ 79.694496] Code:
ff 85 c0 0f 84 15 fb ff ff 8b 05 ca 3c 11 01 85 c0 0f 85 07 fb ff ff
48 c7 c6 30 cb 84 aa 48 c7 c7 a3 e1 82 aa e8 ac 29 f8 ff <0f> 0b e9 ed
fa ff ff e8 5b 83 8a ff 85 c0 74 10 44 8b 0d 98 3c 11 [ 79.694513]
RSP: 0018:ffffad1dc048bbe0 EFLAGS: 00010282 [ 79.694623] RAX:
0000000000000028 RBX: 0000000000000000 RCX: 0000000000000000 [
79.694636] RDX: 0000000000000001 RSI: ffffffffaa8b0ffc RDI:
00000000ffffffff [ 79.694650] RBP: ffffad1dc048bc80 R08:
0000000000000000 R09: ffffad1dc048ba90 [ 79.694662] R10:
0000000000000003 R11: ffffffffaad62fe8 R12: ffff9ff302103138 [
79.694675] R13: ffff9ff306ec8000 R14: ffff9ff307779078 R15:
ffff9ff3014c0270 [ 79.694690] FS: 00007ff1cccf1740(0000)
GS:ffff9ff3bc200000(0000) knlGS:0000000000000000 [ 79.694705] CS: 0010
DS: 0000 ES: 0000 CR0: 0000000080050033 [ 79.694719] CR2:
0000559ecbcb4420 CR3: 0000000013210000 CR4: 00000000000006f0 [
79.694734] Call Trace: [ 79.694749] |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48633 https://git.kernel.org/stable/c/55c077d97fa67e9f19952bb24122a8316b089474 https://git.kernel.org/stable/c/55c077d97fa67e9f19952bb24122a8316b089474 https://git.kernel.org/stable/c/b6f25c3b94f2aadbf5cbef954db4073614943d74 https://git.kernel.org/stable/c/b6f25c3b94f2aadbf5cbef954db4073614943d74 |