In the Linux kernel, the following vulnerability has been resolved:
gpiolib: cdev: fix NULL-pointer dereferences
There are several places where we can crash the kernel by requesting
lines, unbinding the GPIO device, then calling any of the system calls
relevant to the GPIO character device's annonymous file descriptors:
ioctl(), read(), poll().
While I observed it with the GPIO simulator, it will also happen for any
of the GPIO devices that can be hot-unplugged - for instance any HID GPIO
expander (e.g. CP2112).
This affects both v1 and v2 uAPI.
This fixes it partially by checking if gdev->chip is not NULL but it
doesn't entirely remedy the situation as we still have a race condition
in which another thread can remove the device after the check.
References
Configurations
Configuration 1 (hide)
|
History
16 Jan 2026, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/533aae7c94dbc2b14301cfd68ae7e0e90f0c8438 - Patch | |
| References | () https://git.kernel.org/stable/c/6d79546622baab843172b52c3af035f83c1b21df - Patch | |
| References | () https://git.kernel.org/stable/c/7c755a2d6df511eeb5afba966ac28140f9ea5063 - Patch | |
| References | () https://git.kernel.org/stable/c/ac6ce3cd7a3e10a2e37b8970bab81b4d33d5cfc3 - Patch | |
| References | () https://git.kernel.org/stable/c/d66f68ac9e7ba46b6b90fbe25155723f2126088a - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-476 |
01 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 12:15
Updated : 2026-01-16 19:23
NVD link : CVE-2022-50453
Mitre link : CVE-2022-50453
CVE.ORG link : CVE-2022-50453
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
