In the Linux kernel, the following vulnerability has been resolved:
drm: Fix potential null-ptr-deref in drmvblankdestroy_worker()
drmvblankinit() call drmmaddactionorreset() with drmvblankinitrelease() as action. If _drmmaddaction() failed, will directly call drmvblankinitrelease() with the vblank whose worker is NULL. As the resule, a null-ptr-deref will happen in kthreaddestroyworker(). Add the NULL check before calling drmvblankdestroyworker().
BUG: null-ptr-deref KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 5 PID: 961 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf-dirty RIP: 0010:kthreaddestroyworker+0x25/0xb0 Call Trace: <TASK> drmvblankinitrelease+0x124/0x220 [drm] ? drmcrtcvblankrestore+0x8b0/0x8b0 [drm] _drmmaddactionorreset+0x41/0x50 [drm] drmvblankinit+0x282/0x310 [drm] vkmsinit+0x35f/0x1000 [vkms] ? 0xffffffffc4508000 ? lockisheldtype+0xd7/0x130 ? _kmemcacheallocnode+0x1c2/0x2b0 ? lockisheldtype+0xd7/0x130 ? 0xffffffffc4508000 dooneinitcall+0xd0/0x4f0 ... dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x46/0xb0
[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
]
},
"deprecated": false,
"id": "CVE-2022-49827-0b301f61",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3acd2016421b2e628acad65495d15493bf7a3bc3"
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
]
},
"deprecated": false,
"id": "CVE-2022-49827-13ded78e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4979524f5a2a8210e87fde2f642b0dc060860821"
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
]
},
"deprecated": false,
"id": "CVE-2022-49827-9e9b0cdd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d160dfb3fdf11ba9447e862c548447f91f4e74a"
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/drm_internal.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"123272976932787657364129349424408112309",
"45138847382387119972822452474955860701",
"84023123668666065874089165072435487813",
"223322973090964207784664224584538471025"
]
},
"deprecated": false,
"id": "CVE-2022-49827-e85a6d17",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e884a6c2d49a6c12761e5bed851e9fe93bd923a1"
}
]