CVE-2022-50317

Source
https://cve.org/CVERecord?id=CVE-2022-50317
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50317.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50317
Downstream
Related
Published
2025-09-15T14:48:50.167Z
Modified
2026-03-12T03:26:23.762529Z
Summary
drm/bridge: megachips: Fix a null pointer dereference bug
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: megachips: Fix a null pointer dereference bug

When removing the module we will get the following warning:

[ 31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered [ 31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI [ 31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 31.915280] RIP: 0010:drmbridgeremove+0x97/0x130 [ 31.921825] Call Trace: [ 31.922533] stdp4028geb850v3fwremove+0x34/0x60 [megachipsstdpxxxxgeb850v3fw] [ 31.923139] i2cdeviceremove+0x181/0x1f0

The two bridges (stdp2690, stdp4028) do not probe at the same time, so the driver does not call geb850v3resgiter() when probing, causing the driver to try to remove the object that has not been initialized.

Fix this by checking whether both the bridges are probed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50317.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7649972d97fb98578fbc4a351416cf72895e7c4d
Fixed
aaa512ad1e59f2edf8a9e4f2b167a44b24670679
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
16e3827904932eccfba0915f0c93b519de3536ac
Fixed
5bc20bafcd87ba0858ab772cefc7047cb51bc249
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
50ad94f8654a53ec9ca3604a7a23cbaf166e0119
Fixed
1daf69228e310938177119c4eadcd30fc75c81e0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8d10f601f226f055df8b5368d7ea7f369136cd5
Fixed
877e92e9b1bdeb580b31a46061005936be902cd4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
405856460d3e7aefb7c1aef047ec88fc4ef2e2a5
Fixed
4610e7a4111fa3f3ce27c09d6d94008c55f1cd31
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11632d4aa2b3f126790e81a4415d6c23103cf8bb
Fixed
21764467ab396d9f08921e0a5ffa1214244e1ad9
Fixed
7371fad5cfe6eada6bb5523c895fd6074b15c2b9
Fixed
1ff673333d46d2c1b053ebd0c1c7c7c79e36943e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
e449461989f0674f188d30494ffd3f5ba74c1a05

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50317.json"