CVE-2022-50628

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50628
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50628.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50628
Downstream
Published
2025-12-08T01:16:43.390Z
Modified
2025-12-08T03:10:13.553176Z
Summary
drm/gud: Fix UBSAN warning
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/gud: Fix UBSAN warning

UBSAN complains about invalid value for bool:

[ 101.165172] [drm] Initialized gud 1.0.0 20200422 for 2-3.2:1.0 on minor 1 [ 101.213360] gud 2-3.2:1.0: [drm] fb1: guddrmfb frame buffer device [ 101.213426] usbcore: registered new interface driver gud [ 101.989431] ================================================================================ [ 101.989441] UBSAN: invalid-load in linux/include/linux/iosys-map.h:253:9 [ 101.989447] load of value 121 is not a valid value for type 'Bool' [ 101.989451] CPU: 1 PID: 455 Comm: kworker/1:6 Not tainted 5.18.0-rc5-gud-5.18-rc5 #3 [ 101.989456] Hardware name: Hewlett-Packard HP EliteBook 820 G1/1991, BIOS L71 Ver. 01.44 04/12/2018 [ 101.989459] Workqueue: eventslong gudflushwork [gud] [ 101.989471] Call Trace: [ 101.989474] <TASK> [ 101.989479] dumpstacklvl+0x49/0x5f [ 101.989488] dumpstack+0x10/0x12 [ 101.989493] ubsanepilogue+0x9/0x3b [ 101.989498] _ubsanhandleloadinvalidvalue.cold+0x44/0x49 [ 101.989504] dmabufvmap.cold+0x38/0x3d [ 101.989511] ? findbusiestgroup+0x48/0x300 [ 101.989520] drmgemshmemvmap+0x76/0x1b0 [drmshmemhelper] [ 101.989528] drmgemshmemobjectvmap+0x9/0xb [drmshmemhelper] [ 101.989535] drmgemvmap+0x26/0x60 [drm] [ 101.989594] drmgemfbvmap+0x47/0x150 [drmkmshelper] [ 101.989630] gudprepflush+0xc1/0x710 [gud] [ 101.989639] ? _rawspinlock+0x17/0x40 [ 101.989648] gudflushwork+0x1e0/0x430 [gud] [ 101.989653] ? _switchto+0x11d/0x470 [ 101.989664] processonework+0x21f/0x3f0 [ 101.989673] workerthread+0x200/0x3e0 [ 101.989679] ? rescuerthread+0x390/0x390 [ 101.989684] kthread+0xfd/0x130 [ 101.989690] ? kthreadcompleteandexit+0x20/0x20 [ 101.989696] retfromfork+0x22/0x30 [ 101.989706] </TASK> [ 101.989708] ================================================================================

The source of this warning is in iosysmapclear() called from dmabufvmap(). It conditionally sets values based on map->isiomem. The iosysmap variables are allocated uninitialized on the stack leading to ->is_iomem having all kinds of values and not only 0/1.

Fix this by zeroing the iosys_map variables.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50628.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
40e1a70b4aedf2859a1829991b48ef0ebe650bf2
Fixed
832f861a46039d50536dcfda0a9fb334b48d0f8b
Fixed
e1078b270d218f8d58efb4d78ea25a4d16ba3490
Fixed
951df98024f7272f85df5044eca7374f5b5b24ef

Affected versions

v5.*

v5.12
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50628.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50628.json"