CVE-2022-50556

Source
https://cve.org/CVERecord?id=CVE-2022-50556
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50556.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50556
Downstream
Related
Published
2025-10-22T13:23:17.527Z
Modified
2026-03-12T03:26:39.785026Z
Summary
drm: Fix potential null-ptr-deref due to drmm_mode_config_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm: Fix potential null-ptr-deref due to drmmmodeconfig_init()

drmmmodeconfiginit() will call drmmodecreatestandardproperties() and won't check the ret value. When drmmodecreatestandard_properties() failed due to alloc, property will be a NULL pointer and may causes the null-ptr-deref. Fix the null-ptr-deref by adding the ret value check.

Found null-ptr-deref while testing insert module bochs: general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] CPU: 3 PID: 249 Comm: modprobe Not tainted 6.1.0-rc1+ #364 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:drmobjectattach_property+0x73/0x3c0 [drm] Call Trace: <TASK> __drmconnectorinit+0xb6c/0x1100 [drm] bochspciprobe.cold.11+0x4cb/0x7fe [bochs] pcideviceprobe+0x17d/0x340 really_probe+0x1db/0x5d0 __driverprobedevice+0x1e7/0x250 driverprobedevice+0x4a/0x120 __driverattach+0xcd/0x2c0 busforeachdev+0x11a/0x1b0 busadddriver+0x3d7/0x500 driverregister+0x18e/0x320 dooneinitcall+0xc4/0x3e0 doinitmodule+0x1b4/0x630 loadmodule+0x5dca/0x7230 _dosysfinitmodule+0x100/0x170 dosyscall64+0x3f/0x90 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7ff65af9f839

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50556.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6b4959f43a04e12d39c5700607727f2cbcfeac31
Fixed
5ae70041a6d7de62a0cdb2bbcfe0c9cf753035d0
Fixed
d06e827a65a6bcd2e329045d891d0739cec1cf4a
Fixed
b14147464251f66e38fa39f0aae9780466db8610
Fixed
961620ad67611a7320a49f4b6f3c5e2906833a03
Fixed
834c23e4f798dcdc8af251b3c428ceef94741991

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50556.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50556.json"