-
CVE-2022-50317
- EPSS 0.03%
- Published 15.09.2025 14:48:50
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: megachips: Fix a null pointer dereference bug When removing the module we will get the following warning: [ 31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered [ 31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI [ 31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 31.915280] RIP: 0010:drm_bridge_remove+0x97/0x130 [ 31.921825] Call Trace: [ 31.922533] stdp4028_ge_b850v3_fw_remove+0x34/0x60 [megachips_stdpxxxx_ge_b850v3_fw] [ 31.923139] i2c_device_remove+0x181/0x1f0 The two bridges (stdp2690, stdp4028) do not probe at the same time, so the driver does not call ge_b850v3_resgiter() when probing, causing the driver to try to remove the object that has not been initialized. Fix this by checking whether both the bridges are probed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
aaa512ad1e59f2edf8a9e4f2b167a44b24670679
Version
7649972d97fb98578fbc4a351416cf72895e7c4d
Status
affected
Version <
5bc20bafcd87ba0858ab772cefc7047cb51bc249
Version
16e3827904932eccfba0915f0c93b519de3536ac
Status
affected
Version <
1daf69228e310938177119c4eadcd30fc75c81e0
Version
50ad94f8654a53ec9ca3604a7a23cbaf166e0119
Status
affected
Version <
877e92e9b1bdeb580b31a46061005936be902cd4
Version
b8d10f601f226f055df8b5368d7ea7f369136cd5
Status
affected
Version <
4610e7a4111fa3f3ce27c09d6d94008c55f1cd31
Version
405856460d3e7aefb7c1aef047ec88fc4ef2e2a5
Status
affected
Version <
21764467ab396d9f08921e0a5ffa1214244e1ad9
Version
11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status
affected
Version <
7371fad5cfe6eada6bb5523c895fd6074b15c2b9
Version
11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status
affected
Version <
1ff673333d46d2c1b053ebd0c1c7c7c79e36943e
Version
11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status
affected
Version
e449461989f0674f188d30494ffd3f5ba74c1a05
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.17
Status
affected
Version <
5.17
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.296
Status
unaffected
Version <=
4.19.*
Version
4.19.262
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|