CVE-2022-50556
Description
In the Linux kernel, the following vulnerability has been resolved:
drm: Fix potential null-ptr-deref due to drmm_mode_config_init()
drmm_mode_config_init() will call drm_mode_create_standard_properties() and won't check the ret value. When drm_mode_create_standard_properties() failed due to alloc, property will be a NULL pointer and may causes the null-ptr-deref. Fix the null-ptr-deref by adding the ret value check.
Found null-ptr-deref while testing insert module bochs: general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] CPU: 3 PID: 249 Comm: modprobe Not tainted 6.1.0-rc1+ #364 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:drm_object_attach_property+0x73/0x3c0 [drm] Call Trace:
__drm_connector_init+0xb6c/0x1100 [drm] bochs_pci_probe.cold.11+0x4cb/0x7fe [bochs] pci_device_probe+0x17d/0x340 really_probe+0x1db/0x5d0 __driver_probe_device+0x1e7/0x250 driver_probe_device+0x4a/0x120 __driver_attach+0xcd/0x2c0 bus_for_each_dev+0x11a/0x1b0 bus_add_driver+0x3d7/0x500 driver_register+0x18e/0x320 do_one_initcall+0xc4/0x3e0 do_init_module+0x1b4/0x630 load_module+0x5dca/0x7230 __do_sys_finit_module+0x100/0x170 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ff65af9f839
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-pointer dereference in Linux kernel's DRM core, triggered during mode configuration initialization if memory allocation fails.
Vulnerability
The Linux kernel's Direct Rendering Manager (DRM) subsystem contains a null-pointer dereference vulnerability in the drmm_mode_config_init() function. This function calls drm_mode_create_standard_properties() to allocate standard DRM properties but does not check its return value. If memory allocation fails, the property pointer becomes NULL, leading to a null-ptr-deref when subsequent code—such as drm_object_attach_property()—attempts to use the NULL pointer.
Exploitation
An attacker would need to cause a memory allocation failure during the initialization of a DRM device. This can be achieved by exhausting system memory or by loading a malicious or vulnerable DRM driver module (e.g., the bochs driver) on a kernel with low memory. The vulnerability is triggered during driver probe, as shown in the kernel crash trace where bochs_pci_probe calls __drm_connector_init, which in turn invokes drm_object_attach_property on a NULL property. No special privileges beyond the ability to load a kernel module are required, though physical or local access may be needed to manipulate memory pressure.
Impact
A successful null-pointer dereference causes a kernel crash (general protection fault), leading to a denial of service (DoS). The crash trace shows an unprivileged user can trigger the bug by inserting the bochs module, causing a system panic or hang. No privilege escalation is possible, as the bug only results in a crash.
Mitigation
The fix has been committed to the Linux kernel stable tree. The patch adds a return value check for drm_mode_create_standard_properties() inside drmm_mode_config_init(). System administrators should update their kernel to a version containing the commit 961620ad6761 [1] or the equivalent backport [2]. No workaround is available besides applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
55ae70041a6d7d06e827a65a6b14147464251961620ad6761834c23e4f798Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/5ae70041a6d7de62a0cdb2bbcfe0c9cf753035d0nvd
- git.kernel.org/stable/c/834c23e4f798dcdc8af251b3c428ceef94741991nvd
- git.kernel.org/stable/c/961620ad67611a7320a49f4b6f3c5e2906833a03nvd
- git.kernel.org/stable/c/b14147464251f66e38fa39f0aae9780466db8610nvd
- git.kernel.org/stable/c/d06e827a65a6bcd2e329045d891d0739cec1cf4anvd
News mentions
0No linked articles in our index yet.