CVE-2022-50369
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
17/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/vkms: Fix null-ptr-deref in vkms_release()<br />
<br />
A null-ptr-deref is triggered when it tries to destroy the workqueue in<br />
vkms->output.composer_workq in vkms_release().<br />
<br />
KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]<br />
CPU: 5 PID: 17193 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf #24<br />
RIP: 0010:destroy_workqueue+0x2f/0x710<br />
...<br />
Call Trace:<br />
<br />
? vkms_config_debugfs_init+0x50/0x50 [vkms]<br />
__devm_drm_dev_alloc+0x15a/0x1c0 [drm]<br />
vkms_init+0x245/0x1000 [vkms]<br />
do_one_initcall+0xd0/0x4f0<br />
do_init_module+0x1a4/0x680<br />
load_module+0x6249/0x7110<br />
__do_sys_finit_module+0x140/0x200<br />
do_syscall_64+0x35/0x80<br />
entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
The reason is that an OOM happened which triggers the destroy of the<br />
workqueue, however, the workqueue is alloced in the later process,<br />
thus a null-ptr-deref happened. A simple call graph is shown as below:<br />
<br />
vkms_init()<br />
vkms_create()<br />
devm_drm_dev_alloc()<br />
__devm_drm_dev_alloc()<br />
devm_drm_dev_init()<br />
devm_add_action_or_reset()<br />
devm_add_action() # an error happened<br />
devm_drm_dev_init_release()<br />
drm_dev_put()<br />
kref_put()<br />
drm_dev_release()<br />
vkms_release()<br />
destroy_workqueue() # null-ptr-deref happened<br />
vkms_modeset_init()<br />
vkms_output_init()<br />
vkms_crtc_init() # where the workqueue get allocated<br />
<br />
Fix this by checking if composer_workq is NULL before passing it to<br />
the destroy_workqueue() in vkms_release().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.10.173 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0b8f390e2251191f1b179cc87f65d54c96565f0d
- https://git.kernel.org/stable/c/1f9836f95271e7acf016667eee0aeae3386f9645
- https://git.kernel.org/stable/c/2fe2a8f40c21161ffe7653cc234e7934db5b7cc5
- https://git.kernel.org/stable/c/57031c474c3a920ea73afeb5dc352e537f5793ee
- https://git.kernel.org/stable/c/596f1ba3987e601e31a5abf1f75ce1d2635aceac



