CVE-2022-50468

Source
https://cve.org/CVERecord?id=CVE-2022-50468
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50468.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50468
Downstream
Related
Published
2025-10-01T11:45:38.881Z
Modified
2026-04-11T12:44:57.344513Z
Summary
platform/chrome: cros_usbpd_notify: Fix error handling in cros_usbpd_notify_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

platform/chrome: crosusbpdnotify: Fix error handling in crosusbpdnotify_init()

The following WARNING message was given when rmmod crosusbpdnotify:

Unexpected driver unregister! WARNING: CPU: 0 PID: 253 at drivers/base/driver.c:270 driverunregister+0x8a/0xb0 Modules linked in: crosusbpdnotify(-) CPU: 0 PID: 253 Comm: rmmod Not tainted 6.1.0-rc3 #24 ... Call Trace: <TASK> crosusbpdnotifyexit+0x11/0x1e [crosusbpdnotify] __x64sysdelete_module+0x3c7/0x570 ? __ia32sysdeletemodule+0x570/0x570 ? lockisheldtype+0xe3/0x140 ? syscallenterfromusermode+0x17/0x50 ? rcureadlockschedheld+0xa0/0xd0 ? syscallenterfromusermode+0x1c/0x50 dosyscall64+0x37/0x90 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7f333fe9b1b7

The reason is that the crosusbpdnotifyinit() does not check the return value of platformdriverregister(), and the crosusbpdnotify can install successfully even if platformdriver_register() failed.

Fix by checking the return value of platformdriverregister() and unregister crosusbpdnotifyplatdriver when it failed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50468.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ec2daf6e33f9f9113ba085b6ff88592907b6f1ce
Fixed
5c0cacdd354987f8f5348d16908716f154047890
Fixed
cab345f9d51943898e406275f9607c145adb1877
Fixed
7b6ee54995739202b4a0cc01b7e9269f761c573d
Fixed
751f12696d797e785d2611099fe9f0569d47556e
Fixed
5a2d96623670155d94aca72c320c0ac27bdc6bd2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50468.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50468.json"