CVE-2022-50538 PUBLISHED

vme: Fix error not catched in fake_init()

Assigner: Linux
Reserved: 07.10.2025 Published: 07.10.2025 Updated: 07.10.2025

In the Linux kernel, the following vulnerability has been resolved:

vme: Fix error not catched in fake_init()

In fake_init(), __root_device_register() is possible to fail but it's ignored, which can cause unregistering vme_root fail when exit.

general protection fault, probably for non-canonical address 0xdffffc000000008c KASAN: null-ptr-deref in range [0x0000000000000460-0x0000000000000467] RIP: 0010:root_device_unregister+0x26/0x60 Call Trace: <TASK> __x64_sys_delete_module+0x34f/0x540 do_syscall_64+0x38/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Return error when __root_device_register() fails.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to e831fdd60e5863ee03173baf5a0f7c5450b44381 (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 69b43937f14bdc3594f57f1a507a14f3d1187136 (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 09be0e7ac5f9374b6f8de72c89ed67129af71f65 (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to f3f65c4177846c483bf009f8c512ab04b3c62466 (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 37d3de40c1ffb6a5e626bf46ff5ef5766c824e2c (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 4bc217b25ea81034fad8e33fd33e4659f086421d (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to a2a93546d414c7fe4862b87183fb737d1300d9d2 (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 60ff9bd4ffc87bace581e235a6728f5ac8e5071f (excl.)
  • affected from 658bcdae9c6755806e66b33e29d56b33a3ff421a to 7bef797d707f1744f71156b21d41e3b8c946631f (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.9 is affected
  • unaffected from 0 to 4.9 (excl.)
  • unaffected from 4.9.337 to 4.9.* (incl.)
  • unaffected from 4.14.303 to 4.14.* (incl.)
  • unaffected from 4.19.270 to 4.19.* (incl.)
  • unaffected from 5.4.229 to 5.4.* (incl.)
  • unaffected from 5.10.163 to 5.10.* (incl.)
  • unaffected from 5.15.86 to 5.15.* (incl.)
  • unaffected from 6.0.16 to 6.0.* (incl.)
  • unaffected from 6.1.2 to 6.1.* (incl.)
  • unaffected from 6.2 to * (incl.)

References