In the Linux kernel, the following vulnerability has been resolved:
drm: Fix potential null-ptr-deref due to drmmmodeconfig_init()
drmmmodeconfiginit() will call drmmodecreatestandardproperties() and won't check the ret value. When drmmodecreatestandard_properties() failed due to alloc, property will be a NULL pointer and may causes the null-ptr-deref. Fix the null-ptr-deref by adding the ret value check.
Found null-ptr-deref while testing insert module bochs: general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] CPU: 3 PID: 249 Comm: modprobe Not tainted 6.1.0-rc1+ #364 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:drmobjectattachproperty+0x73/0x3c0 [drm] Call Trace: <TASK> _drmconnectorinit+0xb6c/0x1100 [drm] bochspciprobe.cold.11+0x4cb/0x7fe [bochs] pcideviceprobe+0x17d/0x340 reallyprobe+0x1db/0x5d0 _driverprobedevice+0x1e7/0x250 driverprobedevice+0x4a/0x120 _driverattach+0xcd/0x2c0 busforeachdev+0x11a/0x1b0 busadddriver+0x3d7/0x500 driverregister+0x18e/0x320 dooneinitcall+0xc4/0x3e0 doinitmodule+0x1b4/0x630 loadmodule+0x5dca/0x7230 _dosysfinitmodule+0x100/0x170 dosyscall64+0x3f/0x90 entrySYSCALL64after_hwframe+0x63/0xcd RIP: 0033:0x7ff65af9f839
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50556.json"
}