CVE-2022-50292
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-15

Last updated on: 2025-12-04

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: fix bridge lifetime Device-managed resources allocated post component bind must be tied to the lifetime of the aggregate DRM device or they will not necessarily be released when binding of the aggregate device is deferred. This can lead resource leaks or failure to bind the aggregate device when binding is later retried and a second attempt to allocate the resources is made. For the DP bridges, previously allocated bridges will leak on probe deferral. Fix this by amending the DP parser interface and tying the lifetime of the bridge device to the DRM device rather than DP platform device. Patchwork: https://patchwork.freedesktop.org/patch/502667/
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-15
Last Modified
2025-12-04
Generated
2026-05-07
AI Q&A
2025-09-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.19 (inc) to 6.0.7 (exc)
linux linux_kernel 6.1
linux linux_kernel 6.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's drm/msm/dp component involves improper management of device-managed resources. Resources allocated after the component bind are not correctly tied to the lifetime of the aggregate DRM device. As a result, these resources may not be released if the binding of the aggregate device is deferred, leading to resource leaks or failure to bind the device on subsequent attempts. Specifically, DP bridges allocated earlier will leak when probe deferral occurs. The fix involves changing the DP parser interface to tie the lifetime of the bridge device to the DRM device instead of the DP platform device.


How can this vulnerability impact me? :

This vulnerability can cause resource leaks in the Linux kernel's DRM subsystem, which may lead to system instability or failure to properly bind display devices when binding is deferred and retried. This could affect the reliability and performance of systems using the affected Linux kernel component, potentially causing display issues or degraded system behavior.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch that fixes the DP bridge lifetime issue in the Linux kernel as described in the patchwork link: https://patchwork.freedesktop.org/patch/502667/. This patch ties the lifetime of the bridge device to the DRM device to prevent resource leaks and binding failures. Updating your Linux kernel to a version that includes this fix is the recommended mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart