{"id":"CVE-2022-50218","summary":"iio: light: isl29028: Fix the warning in isl29028_remove()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: isl29028: Fix the warning in isl29028_remove()\n\nThe driver use the non-managed form of the register function in\nisl29028_remove(). To keep the release order as mirroring the ordering\nin probe, the driver should use non-managed form in probe, too.\n\nThe following log reveals it:\n\n[   32.374955] isl29028 0-0010: remove\n[   32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\n[   32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n[   32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0\n[   32.385461] Call Trace:\n[   32.385807]  sysfs_unmerge_group+0x59/0x110\n[   32.386110]  dpm_sysfs_remove+0x58/0xc0\n[   32.386391]  device_del+0x296/0xe50\n[   32.386959]  cdev_device_del+0x1d/0xd0\n[   32.387231]  devm_iio_device_unreg+0x27/0xb0\n[   32.387542]  devres_release_group+0x319/0x3d0\n[   32.388162]  i2c_device_remove+0x93/0x1f0","modified":"2026-04-03T13:14:37.838324546Z","published":"2025-06-18T11:03:54.101Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50218.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/06674fc7c003b9d0aa1d37fef7ab2c24802cc6ad"},{"type":"WEB","url":"https://git.kernel.org/stable/c/359f3b150eab30805fe0e4e9d616887d7257a625"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f0ebfb4b9bfad2326c0b2c3cc7e37f4b9ee9eba"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a1135205b0affd255510775a27df571aca84ab4b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca63d5abf404d2934e2ac03545350de7bb8c8e96"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed43fb20d3d1fca9d79db0d5faf4321a4dd58c23"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fac589fb764699a4bcd288f6656b8cd0408ea968"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb1888205c0782f287e5dd4ffff1f665332e868c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50218.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50218"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2db5054ac28d4ab2eaa6c67e2d9f61fa5ba006b8"},{"fixed":"ca63d5abf404d2934e2ac03545350de7bb8c8e96"},{"fixed":"359f3b150eab30805fe0e4e9d616887d7257a625"},{"fixed":"ed43fb20d3d1fca9d79db0d5faf4321a4dd58c23"},{"fixed":"fb1888205c0782f287e5dd4ffff1f665332e868c"},{"fixed":"fac589fb764699a4bcd288f6656b8cd0408ea968"},{"fixed":"4f0ebfb4b9bfad2326c0b2c3cc7e37f4b9ee9eba"},{"fixed":"a1135205b0affd255510775a27df571aca84ab4b"},{"fixed":"06674fc7c003b9d0aa1d37fef7ab2c24802cc6ad"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50218.json"}}],"schema_version":"1.7.5"}