CVE-2022-50317

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: megachips: Fix a null pointer dereference bug When removing the module we will get the following warning: [ 31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered [ 31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI [ 31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 31.915280] RIP: 0010:drm_bridge_remove+0x97/0x130 [ 31.921825] Call Trace: [ 31.922533] stdp4028_ge_b850v3_fw_remove+0x34/0x60 [megachips_stdpxxxx_ge_b850v3_fw] [ 31.923139] i2c_device_remove+0x181/0x1f0 The two bridges (stdp2690, stdp4028) do not probe at the same time, so the driver does not call ge_b850v3_resgiter() when probing, causing the driver to try to remove the object that has not been initialized. Fix this by checking whether both the bridges are probed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Dec 2025, 15:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1daf69228e310938177119c4eadcd30fc75c81e0 - () https://git.kernel.org/stable/c/1daf69228e310938177119c4eadcd30fc75c81e0 - Patch
References () https://git.kernel.org/stable/c/1ff673333d46d2c1b053ebd0c1c7c7c79e36943e - () https://git.kernel.org/stable/c/1ff673333d46d2c1b053ebd0c1c7c7c79e36943e - Patch
References () https://git.kernel.org/stable/c/21764467ab396d9f08921e0a5ffa1214244e1ad9 - () https://git.kernel.org/stable/c/21764467ab396d9f08921e0a5ffa1214244e1ad9 - Patch
References () https://git.kernel.org/stable/c/4610e7a4111fa3f3ce27c09d6d94008c55f1cd31 - () https://git.kernel.org/stable/c/4610e7a4111fa3f3ce27c09d6d94008c55f1cd31 - Patch
References () https://git.kernel.org/stable/c/5bc20bafcd87ba0858ab772cefc7047cb51bc249 - () https://git.kernel.org/stable/c/5bc20bafcd87ba0858ab772cefc7047cb51bc249 - Patch
References () https://git.kernel.org/stable/c/7371fad5cfe6eada6bb5523c895fd6074b15c2b9 - () https://git.kernel.org/stable/c/7371fad5cfe6eada6bb5523c895fd6074b15c2b9 - Patch
References () https://git.kernel.org/stable/c/877e92e9b1bdeb580b31a46061005936be902cd4 - () https://git.kernel.org/stable/c/877e92e9b1bdeb580b31a46061005936be902cd4 - Patch
References () https://git.kernel.org/stable/c/aaa512ad1e59f2edf8a9e4f2b167a44b24670679 - () https://git.kernel.org/stable/c/aaa512ad1e59f2edf8a9e4f2b167a44b24670679 - Patch
CWE CWE-476
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-04 15:19


NVD link : CVE-2022-50317

Mitre link : CVE-2022-50317

CVE.ORG link : CVE-2022-50317


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference