[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091508-CVE-2022-50287-a3ce@gregkh>
Date: Mon, 15 Sep 2025 16:21:29 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50287: drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs
When (size != 0 || ptrs->lvds_ entries != 3), the program tries to
free() the ptrs. However, the ptrs is not created by calling kzmalloc(),
but is obtained by pointer offset operation.
This may lead to memory leaks or undefined behavior.
Fix this by replacing the arguments of kfree() with ptrs_block.
(cherry picked from commit 7674cd0b7d28b952151c3df26bbfa7e07eb2b4ec)
The Linux kernel CVE team has assigned CVE-2022-50287 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.19 with commit a87d0a84760726445dcc0f0177623f0d683f3559 and fixed in 6.0.16 with commit 4758d04014cfe6cdb6e9b4738d1d6728487bbb3a
Issue introduced in 5.19 with commit a87d0a84760726445dcc0f0177623f0d683f3559 and fixed in 6.1.2 with commit 7c852e8f93f04e57c1e3883caa72542469c6c4c4
Issue introduced in 5.19 with commit a87d0a84760726445dcc0f0177623f0d683f3559 and fixed in 6.2 with commit 1382901f75a5a7dc8eac05059fd0c7816def4eae
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50287
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/gpu/drm/i915/display/intel_bios.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/4758d04014cfe6cdb6e9b4738d1d6728487bbb3a
https://git.kernel.org/stable/c/7c852e8f93f04e57c1e3883caa72542469c6c4c4
https://git.kernel.org/stable/c/1382901f75a5a7dc8eac05059fd0c7816def4eae
Powered by blists - more mailing lists