In the Linux kernel, the following vulnerability has been resolved:
drm: Fix potential null-ptr-deref in drmvblankdestroy_worker()
drmvblankinit() call drmmaddactionorreset() with drmvblankinit_release() as action. If __drmmaddaction() failed, will directly call drmvblankinitrelease() with the vblank whose worker is NULL. As the resule, a null-ptr-deref will happen in kthreaddestroyworker(). Add the NULL check before calling drmvblankdestroyworker().
BUG: null-ptr-deref KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 5 PID: 961 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf-dirty RIP: 0010:kthreaddestroyworker+0x25/0xb0 Call Trace: <TASK> drmvblankinitrelease+0x124/0x220 [drm] ? drmcrtcvblankrestore+0x8b0/0x8b0 [drm] __drmmaddactionorreset+0x41/0x50 [drm] drmvblankinit+0x282/0x310 [drm] vkmsinit+0x35f/0x1000 [vkms] ? 0xffffffffc4508000 ? lockisheldtype+0xd7/0x130 ? __kmemcacheallocnode+0x1c2/0x2b0 ? lockisheldtype+0xd7/0x130 ? 0xffffffffc4508000 dooneinitcall+0xd0/0x4f0 ... dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x46/0xb0
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49827.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
},
"id": "CVE-2022-49827-0b301f61",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3acd2016421b2e628acad65495d15493bf7a3bc3",
"digest": {
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
],
"threshold": 0.9
},
"id": "CVE-2022-49827-13ded78e",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4979524f5a2a8210e87fde2f642b0dc060860821",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
}
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2022-49827-9e9b0cdd",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d160dfb3fdf11ba9447e862c548447f91f4e74a",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
}
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
],
"threshold": 0.9
},
"id": "CVE-2022-49827-e85a6d17",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e884a6c2d49a6c12761e5bed851e9fe93bd923a1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49827.json"