{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49512","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-26T02:08:31.587Z","datePublished":"2025-02-26T02:13:42.128Z","dateUpdated":"2025-05-04T08:39:31.928Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:39:31.928Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: denali: Use managed device resources\n\nAll of the resources used by this driver has managed interfaces, so use\nthem. Otherwise we will get the following splat:\n\n[    4.472703] denali-nand-pci 0000:00:05.0: timeout while waiting for irq 0x1000\n[    4.474071] denali-nand-pci: probe of 0000:00:05.0 failed with error -5\n[    4.473538] nand: No NAND device found\n[    4.474068] BUG: unable to handle page fault for address: ffffc90005000410\n[    4.475169] #PF: supervisor write access in kernel mode\n[    4.475579] #PF: error_code(0x0002) - not-present page\n[    4.478362] RIP: 0010:iowrite32+0x9/0x50\n[    4.486068] Call Trace:\n[    4.486269]  <IRQ>\n[    4.486443]  denali_isr+0x15b/0x300 [denali]\n[    4.486788]  ? denali_direct_write+0x50/0x50 [denali]\n[    4.487189]  __handle_irq_event_percpu+0x161/0x3b0\n[    4.487571]  handle_irq_event+0x7d/0x1b0\n[    4.487884]  handle_fasteoi_irq+0x2b0/0x770\n[    4.488219]  __common_interrupt+0xc8/0x1b0\n[    4.488549]  common_interrupt+0x9a/0xc0"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mtd/nand/raw/denali_pci.c"],"versions":[{"version":"93db446a424cee9387b532995e6b516667079555","lessThan":"3c68daf4a368cd9e63ae5a2145c9e4a6f838c166","status":"affected","versionType":"git"},{"version":"93db446a424cee9387b532995e6b516667079555","lessThan":"3830dbdfb9a4aec680e43ed80b9f23db7a88eac9","status":"affected","versionType":"git"},{"version":"93db446a424cee9387b532995e6b516667079555","lessThan":"87149cf9186201a63f0e0b93d9fa93d480bcb771","status":"affected","versionType":"git"},{"version":"93db446a424cee9387b532995e6b516667079555","lessThan":"efea1dd176edd17c8252051b7de6957f06efc394","status":"affected","versionType":"git"},{"version":"93db446a424cee9387b532995e6b516667079555","lessThan":"3a745b51cddafade99aaea1b93aad31e9614e230","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mtd/nand/raw/denali_pci.c"],"versions":[{"version":"4.17","status":"affected"},{"version":"0","lessThan":"4.17","status":"unaffected","versionType":"semver"},{"version":"5.10.121","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.46","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.17.14","lessThanOrEqual":"5.17.*","status":"unaffected","versionType":"semver"},{"version":"5.18.3","lessThanOrEqual":"5.18.*","status":"unaffected","versionType":"semver"},{"version":"5.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17","versionEndExcluding":"5.10.121"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17","versionEndExcluding":"5.15.46"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17","versionEndExcluding":"5.17.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17","versionEndExcluding":"5.18.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.17","versionEndExcluding":"5.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3c68daf4a368cd9e63ae5a2145c9e4a6f838c166"},{"url":"https://git.kernel.org/stable/c/3830dbdfb9a4aec680e43ed80b9f23db7a88eac9"},{"url":"https://git.kernel.org/stable/c/87149cf9186201a63f0e0b93d9fa93d480bcb771"},{"url":"https://git.kernel.org/stable/c/efea1dd176edd17c8252051b7de6957f06efc394"},{"url":"https://git.kernel.org/stable/c/3a745b51cddafade99aaea1b93aad31e9614e230"}],"title":"mtd: rawnand: denali: Use managed device resources","x_generator":{"engine":"bippy-1.2.0"}}}}