DEBIAN-CVE-2022-50556

Source
https://security-tracker.debian.org/tracker/CVE-2022-50556
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50556.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-50556
Upstream
Published
2025-10-22T14:15:39.673Z
Modified
2025-11-20T10:16:33.600024Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmmmodeconfiginit() drmmmodeconfiginit() will call drmmodecreatestandardproperties() and won't check the ret value. When drmmodecreatestandardproperties() failed due to alloc, property will be a NULL pointer and may causes the null-ptr-deref. Fix the null-ptr-deref by adding the ret value check. Found null-ptr-deref while testing insert module bochs: general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] CPU: 3 PID: 249 Comm: modprobe Not tainted 6.1.0-rc1+ #364 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:drmobjectattachproperty+0x73/0x3c0 [drm] Call Trace: <TASK> _drmconnectorinit+0xb6c/0x1100 [drm] bochspciprobe.cold.11+0x4cb/0x7fe [bochs] pcideviceprobe+0x17d/0x340 reallyprobe+0x1db/0x5d0 _driverprobedevice+0x1e7/0x250 driverprobedevice+0x4a/0x120 _driverattach+0xcd/0x2c0 busforeachdev+0x11a/0x1b0 busadddriver+0x3d7/0x500 driverregister+0x18e/0x320 dooneinitcall+0xc4/0x3e0 doinitmodule+0x1b4/0x630 loadmodule+0x5dca/0x7230 _dosysfinitmodule+0x100/0x170 dosyscall64+0x3f/0x90 entrySYSCALL64after_hwframe+0x63/0xcd RIP: 0033:0x7ff65af9f839

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}