CVE-2022-49827

Source
https://cve.org/CVERecord?id=CVE-2022-49827
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49827.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49827
Downstream
Related
Published
2025-05-01T14:09:46.805Z
Modified
2026-04-11T12:44:34.614799Z
Summary
drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm: Fix potential null-ptr-deref in drmvblankdestroy_worker()

drmvblankinit() call drmmaddactionorreset() with drmvblankinit_release() as action. If __drmmaddaction() failed, will directly call drmvblankinitrelease() with the vblank whose worker is NULL. As the resule, a null-ptr-deref will happen in kthreaddestroyworker(). Add the NULL check before calling drmvblankdestroyworker().

BUG: null-ptr-deref KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 5 PID: 961 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf-dirty RIP: 0010:kthreaddestroyworker+0x25/0xb0 Call Trace: <TASK> drmvblankinitrelease+0x124/0x220 [drm] ? drmcrtcvblankrestore+0x8b0/0x8b0 [drm] __drmmaddactionorreset+0x41/0x50 [drm] drmvblankinit+0x282/0x310 [drm] vkmsinit+0x35f/0x1000 [vkms] ? 0xffffffffc4508000 ? lockisheldtype+0xd7/0x130 ? __kmemcacheallocnode+0x1c2/0x2b0 ? lockisheldtype+0xd7/0x130 ? 0xffffffffc4508000 dooneinitcall+0xd0/0x4f0 ... dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x46/0xb0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49827.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e6c2b4f916157e8f10d093d43e88b2a250d1774
Fixed
1d160dfb3fdf11ba9447e862c548447f91f4e74a
Fixed
e884a6c2d49a6c12761e5bed851e9fe93bd923a1
Fixed
3acd2016421b2e628acad65495d15493bf7a3bc3
Fixed
4979524f5a2a8210e87fde2f642b0dc060860821

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49827.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.156
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.80
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49827.json"