In the Linux kernel, the following vulnerability has been resolved:
kernfs: fix potential NULL dereference in _kernfsremove
When lockdep is enabled, lockdepassertheld_write would cause potential NULL pointer dereference.
Fix the following smatch warnings:
fs/kernfs/dir.c:1353 _kernfsremove() warn: variable dereferenced before check 'kn' (see line 1346)
[
{
"id": "CVE-2022-50148-8e507743",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "fs/kernfs/dir.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72b5d5aef246a0387cefa23121dd90901c7a691a",
"digest": {
"line_hashes": [
"102297932054569548466796586634601467256",
"257294277814308995971772954941860965273",
"76513098418875288294761635668334131606",
"226983321628395320507329176924400382777",
"25895428251156041022617663687707530334"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50148-a2242d60",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "fs/kernfs/dir.c",
"function": "__kernfs_remove"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b871986d9d3071f5082664ac274d93f08db257cd",
"digest": {
"length": 819.0,
"function_hash": "293845012129116837747532712150177236629"
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50148-c69eeb0b",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "fs/kernfs/dir.c",
"function": "__kernfs_remove"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a9f35b8729c5bf13ea671c908c17ed74c48fc50",
"digest": {
"length": 819.0,
"function_hash": "293845012129116837747532712150177236629"
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50148-cd7bbce3",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "fs/kernfs/dir.c",
"function": "__kernfs_remove"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72b5d5aef246a0387cefa23121dd90901c7a691a",
"digest": {
"length": 819.0,
"function_hash": "293845012129116837747532712150177236629"
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50148-f820e412",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "fs/kernfs/dir.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a9f35b8729c5bf13ea671c908c17ed74c48fc50",
"digest": {
"line_hashes": [
"102297932054569548466796586634601467256",
"257294277814308995971772954941860965273",
"76513098418875288294761635668334131606",
"226983321628395320507329176924400382777",
"25895428251156041022617663687707530334"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50148-f9c5faaa",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "fs/kernfs/dir.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b871986d9d3071f5082664ac274d93f08db257cd",
"digest": {
"line_hashes": [
"102297932054569548466796586634601467256",
"257294277814308995971772954941860965273",
"76513098418875288294761635668334131606",
"226983321628395320507329176924400382777",
"25895428251156041022617663687707530334"
],
"threshold": 0.9
},
"signature_version": "v1"
}
]