CVE-2022-50218
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
18/06/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iio: light: isl29028: Fix the warning in isl29028_remove()<br />
<br />
The driver use the non-managed form of the register function in<br />
isl29028_remove(). To keep the release order as mirroring the ordering<br />
in probe, the driver should use non-managed form in probe, too.<br />
<br />
The following log reveals it:<br />
<br />
[ 32.374955] isl29028 0-0010: remove<br />
[ 32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI<br />
[ 32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]<br />
[ 32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0<br />
[ 32.385461] Call Trace:<br />
[ 32.385807] sysfs_unmerge_group+0x59/0x110<br />
[ 32.386110] dpm_sysfs_remove+0x58/0xc0<br />
[ 32.386391] device_del+0x296/0xe50<br />
[ 32.386959] cdev_device_del+0x1d/0xd0<br />
[ 32.387231] devm_iio_device_unreg+0x27/0xb0<br />
[ 32.387542] devres_release_group+0x319/0x3d0<br />
[ 32.388162] i2c_device_remove+0x93/0x1f0
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.11 (including) | 4.14.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.256 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.211 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.137 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 5.19.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/06674fc7c003b9d0aa1d37fef7ab2c24802cc6ad
- https://git.kernel.org/stable/c/359f3b150eab30805fe0e4e9d616887d7257a625
- https://git.kernel.org/stable/c/4f0ebfb4b9bfad2326c0b2c3cc7e37f4b9ee9eba
- https://git.kernel.org/stable/c/a1135205b0affd255510775a27df571aca84ab4b
- https://git.kernel.org/stable/c/ca63d5abf404d2934e2ac03545350de7bb8c8e96
- https://git.kernel.org/stable/c/ed43fb20d3d1fca9d79db0d5faf4321a4dd58c23
- https://git.kernel.org/stable/c/fac589fb764699a4bcd288f6656b8cd0408ea968
- https://git.kernel.org/stable/c/fb1888205c0782f287e5dd4ffff1f665332e868c



