-

CVE-2022-50317

In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: megachips: Fix a null pointer dereference bug

When removing the module we will get the following warning:

[   31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered
[   31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
[   31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[   31.915280] RIP: 0010:drm_bridge_remove+0x97/0x130
[   31.921825] Call Trace:
[   31.922533]  stdp4028_ge_b850v3_fw_remove+0x34/0x60 [megachips_stdpxxxx_ge_b850v3_fw]
[   31.923139]  i2c_device_remove+0x181/0x1f0

The two bridges (stdp2690, stdp4028) do not probe at the same time, so
the driver does not call ge_b850v3_resgiter() when probing, causing the
driver to try to remove the object that has not been initialized.

Fix this by checking whether both the bridges are probed.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < aaa512ad1e59f2edf8a9e4f2b167a44b24670679
Version 7649972d97fb98578fbc4a351416cf72895e7c4d
Status affected
Version < 5bc20bafcd87ba0858ab772cefc7047cb51bc249
Version 16e3827904932eccfba0915f0c93b519de3536ac
Status affected
Version < 1daf69228e310938177119c4eadcd30fc75c81e0
Version 50ad94f8654a53ec9ca3604a7a23cbaf166e0119
Status affected
Version < 877e92e9b1bdeb580b31a46061005936be902cd4
Version b8d10f601f226f055df8b5368d7ea7f369136cd5
Status affected
Version < 4610e7a4111fa3f3ce27c09d6d94008c55f1cd31
Version 405856460d3e7aefb7c1aef047ec88fc4ef2e2a5
Status affected
Version < 21764467ab396d9f08921e0a5ffa1214244e1ad9
Version 11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status affected
Version < 7371fad5cfe6eada6bb5523c895fd6074b15c2b9
Version 11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status affected
Version < 1ff673333d46d2c1b053ebd0c1c7c7c79e36943e
Version 11632d4aa2b3f126790e81a4415d6c23103cf8bb
Status affected
Version e449461989f0674f188d30494ffd3f5ba74c1a05
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.17
Status affected
Version < 5.17
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string