In the Linux kernel, the following vulnerability has been resolved:
tty: fix possible null-ptr-defer in spkttyiorelease
Run the following tests on the qemu platform:
syzkaller:~# modprobe speakup_audptr input: Speakup as /devices/virtual/input/input4 initialized device: /dev/synth, node (MAJOR 10, MINOR 125) speakup 3.1.6: initialized synth name on entry is: (null) synth probe
spkttyioinitialiseldisc failed because ttykopen_exclusive returned failed (errno -16), then remove the module, we will get a null-ptr-defer problem, as follow:
syzkaller:~# modprobe -r speakupaudptr releasing synth audptr BUG: kernel NULL pointer dereference, address: 0000000000000080 #PF: supervisor write access in kernel mode #PF: errorcode(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] PREEMPT SMP PTI CPU: 2 PID: 204 Comm: modprobe Not tainted 6.1.0-rc6-dirty #1 RIP: 0010:mutexlock+0x14/0x30 Call Trace: <TASK> spkttyiorelease+0x19/0x70 [speakup] synthrelease.part.6+0xac/0xc0 [speakup] synthremove+0x56/0x60 [speakup] _x64sysdeletemodule+0x156/0x250 ? fpregsassertstateconsistent+0x1d/0x50 dosyscall64+0x37/0x90 entrySYSCALL64afterhwframe+0x63/0xcd </TASK> Modules linked in: speakup_audptr(-) speakup Dumping ftrace buffer:
insynth->dev was not initialized during modprobe, so we add check for insynth->dev to fix this bug.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5",
"target": {
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-190d591b",
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44667930481586350597707408130324405533",
"323368231760875883006925320442666781621",
"226896962746905650409772620532239122171"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64152e05a4de3ebf59f1740a0985a6d5fba0c77b",
"target": {
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-56836428",
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44667930481586350597707408130324405533",
"323368231760875883006925320442666781621",
"226896962746905650409772620532239122171"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64152e05a4de3ebf59f1740a0985a6d5fba0c77b",
"target": {
"function": "spk_ttyio_release",
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-b4d2d22d",
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 227.0,
"function_hash": "61301491220673482849610547003934684553"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2da67bff29ab49caafb0766e8b8383b735ff796f",
"target": {
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-b58b48a3",
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44667930481586350597707408130324405533",
"323368231760875883006925320442666781621",
"226896962746905650409772620532239122171"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2da67bff29ab49caafb0766e8b8383b735ff796f",
"target": {
"function": "spk_ttyio_release",
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-bd878e61",
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 227.0,
"function_hash": "61301491220673482849610547003934684553"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5",
"target": {
"function": "spk_ttyio_release",
"file": "drivers/accessibility/speakup/spk_ttyio.c"
},
"deprecated": false,
"id": "CVE-2022-48870-cb00ea56",
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 227.0,
"function_hash": "61301491220673482849610547003934684553"
}
}
]