CVE-2022-50292 (GCVE-0-2022-50292)
Vulnerability from cvelistv5
Published
2025-09-15 14:45
Modified
2025-09-15 14:45
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: fix bridge lifetime Device-managed resources allocated post component bind must be tied to the lifetime of the aggregate DRM device or they will not necessarily be released when binding of the aggregate device is deferred. This can lead resource leaks or failure to bind the aggregate device when binding is later retried and a second attempt to allocate the resources is made. For the DP bridges, previously allocated bridges will leak on probe deferral. Fix this by amending the DP parser interface and tying the lifetime of the bridge device to the DRM device rather than DP platform device. Patchwork: https://patchwork.freedesktop.org/patch/502667/
Impacted products
Vendor Product Version
Linux Linux Version: c3bf8e21b38a89418f2e22173b229aaad2306815
Version: c3bf8e21b38a89418f2e22173b229aaad2306815
Create a notification for this product.
   Linux Linux Version: 5.19
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/msm/dp/dp_display.c",
            "drivers/gpu/drm/msm/dp/dp_parser.c",
            "drivers/gpu/drm/msm/dp/dp_parser.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "7eda6977e8058dd45607a5bbc6517a0f42ccd6c9",
              "status": "affected",
              "version": "c3bf8e21b38a89418f2e22173b229aaad2306815",
              "versionType": "git"
            },
            {
              "lessThan": "16194958f888d63839042d1190f7001e5ddec47b",
              "status": "affected",
              "version": "c3bf8e21b38a89418f2e22173b229aaad2306815",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/msm/dp/dp_display.c",
            "drivers/gpu/drm/msm/dp/dp_parser.c",
            "drivers/gpu/drm/msm/dp/dp_parser.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "lessThan": "5.19",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.7",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dp: fix bridge lifetime\n\nDevice-managed resources allocated post component bind must be tied to\nthe lifetime of the aggregate DRM device or they will not necessarily be\nreleased when binding of the aggregate device is deferred.\n\nThis can lead resource leaks or failure to bind the aggregate device\nwhen binding is later retried and a second attempt to allocate the\nresources is made.\n\nFor the DP bridges, previously allocated bridges will leak on probe\ndeferral.\n\nFix this by amending the DP parser interface and tying the lifetime of\nthe bridge device to the DRM device rather than DP platform device.\n\nPatchwork: https://patchwork.freedesktop.org/patch/502667/"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-15T14:45:48.427Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/7eda6977e8058dd45607a5bbc6517a0f42ccd6c9"
        },
        {
          "url": "https://git.kernel.org/stable/c/16194958f888d63839042d1190f7001e5ddec47b"
        }
      ],
      "title": "drm/msm/dp: fix bridge lifetime",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50292",
    "datePublished": "2025-09-15T14:45:48.427Z",
    "dateReserved": "2025-09-15T14:18:36.811Z",
    "dateUpdated": "2025-09-15T14:45:48.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50292\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:40.530\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/msm/dp: fix bridge lifetime\\n\\nDevice-managed resources allocated post component bind must be tied to\\nthe lifetime of the aggregate DRM device or they will not necessarily be\\nreleased when binding of the aggregate device is deferred.\\n\\nThis can lead resource leaks or failure to bind the aggregate device\\nwhen binding is later retried and a second attempt to allocate the\\nresources is made.\\n\\nFor the DP bridges, previously allocated bridges will leak on probe\\ndeferral.\\n\\nFix this by amending the DP parser interface and tying the lifetime of\\nthe bridge device to the DRM device rather than DP platform device.\\n\\nPatchwork: https://patchwork.freedesktop.org/patch/502667/\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/16194958f888d63839042d1190f7001e5ddec47b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7eda6977e8058dd45607a5bbc6517a0f42ccd6c9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…