CVE-2022-50489

In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices when removing the host Whenever the MIPI-DSI host is unregistered, the code of mipi_dsi_host_unregister() loops over every device currently found on that bus and will unregister it. However, it doesn't detach it from the bus first, which leads to all kind of resource leaks if the host wants to perform some clean up whenever a device is detached.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Jan 2026, 17:37

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/262364574b05676d4b9ebde2ddd3588cd2efd8ce - () https://git.kernel.org/stable/c/262364574b05676d4b9ebde2ddd3588cd2efd8ce - Patch
References () https://git.kernel.org/stable/c/26c1b4cfe56f040f71a51c92da1f4cac2e3b9455 - () https://git.kernel.org/stable/c/26c1b4cfe56f040f71a51c92da1f4cac2e3b9455 - Patch
References () https://git.kernel.org/stable/c/353ab1c13fdd6e524edde780235a8ce9b892c81c - () https://git.kernel.org/stable/c/353ab1c13fdd6e524edde780235a8ce9b892c81c - Patch
References () https://git.kernel.org/stable/c/45120fa5e522d444e3fc1c5a9afc5d53eed91d00 - () https://git.kernel.org/stable/c/45120fa5e522d444e3fc1c5a9afc5d53eed91d00 - Patch
References () https://git.kernel.org/stable/c/668a8f17b5290d04ef7343636a5588a0692731a1 - () https://git.kernel.org/stable/c/668a8f17b5290d04ef7343636a5588a0692731a1 - Patch
References () https://git.kernel.org/stable/c/6fc2cd40db1969ba372ce9536dcfcdb87271eac4 - () https://git.kernel.org/stable/c/6fc2cd40db1969ba372ce9536dcfcdb87271eac4 - Patch
References () https://git.kernel.org/stable/c/8242167cfc83dd7e4c96f44b45f108db9bb88146 - () https://git.kernel.org/stable/c/8242167cfc83dd7e4c96f44b45f108db9bb88146 - Patch
References () https://git.kernel.org/stable/c/95ae458209f5a556bba98aff872f933694914eb7 - () https://git.kernel.org/stable/c/95ae458209f5a556bba98aff872f933694914eb7 - Patch
References () https://git.kernel.org/stable/c/c202cda08cd5693645d4990ad1eb2e8068a884ec - () https://git.kernel.org/stable/c/c202cda08cd5693645d4990ad1eb2e8068a884ec - Patch

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-01-27 17:37


NVD link : CVE-2022-50489

Mitre link : CVE-2022-50489

CVE.ORG link : CVE-2022-50489


JSON object : View

Products Affected

linux

  • linux_kernel