CVE-2022-50725

Source
https://cve.org/CVERecord?id=CVE-2022-50725
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50725.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50725
Downstream
Published
2025-12-24T12:22:46.939Z
Modified
2026-04-02T08:28:43.459195Z
Summary
media: vidtv: Fix use-after-free in vidtv_bridge_dvb_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: Fix use-after-free in vidtvbridgedvb_init()

KASAN reports a use-after-free: BUG: KASAN: use-after-free in dvbdmxdevrelease+0x4d5/0x5d0 [dvbcore] Call Trace: ... dvbdmxdevrelease+0x4d5/0x5d0 [dvbcore] vidtvbridgeprobe+0x7bf/0xa40 [dvbvidtvbridge] platformprobe+0xb6/0x170 ... Allocated by task 1238: ... dvbregisterdevice+0x1a7/0xa70 [dvbcore] dvbdmxdevinit+0x2af/0x4a0 [dvbcore] vidtvbridgeprobe+0x766/0xa40 [dvbvidtvbridge] ... Freed by task 1238: dvbregisterdevice+0x6d2/0xa70 [dvbcore] dvbdmxdevinit+0x2af/0x4a0 [dvbcore] vidtvbridgeprobe+0x766/0xa40 [dvbvidtv_bridge] ...

It is because the error handling in vidtvbridgedvb_init() is wrong.

First, vidtvbridgedmx(dev)init() will clean themselves when fail, but goto faildmx(_dev): calls release functions again, which causes use-after-free.

Also, in failfe, failtunerprobe and faildemodprobe, j = i will cause out-of-bound when i finished its loop (i == NUMFE). And the loop releasing is wrong, although now NUM_FE is 1 so it won't cause problem.

Fix this by correctly releasing everything.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50725.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f90cf6079bf67988f8b1ad1ade70fc89d0080905
Fixed
0369af6fe33d4053899b121b32e91f870b2cf0ae
Fixed
c290aa527fd832d278c6388a3ba53a9890fbd74a
Fixed
06398ce69571a43a8a0dd0f1bfe35d221f726a6a
Fixed
8a204a0b4a0d105229735222c515759ea2b126c1
Fixed
ba8d9405935097e296bcf7a942c3a01df0edb865

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50725.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50725.json"