CVE-2022-49827
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2025
Last modified:
10/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()<br />
<br />
drm_vblank_init() call drmm_add_action_or_reset() with<br />
drm_vblank_init_release() as action. If __drmm_add_action() failed, will<br />
directly call drm_vblank_init_release() with the vblank whose worker is<br />
NULL. As the resule, a null-ptr-deref will happen in<br />
kthread_destroy_worker(). Add the NULL check before calling<br />
drm_vblank_destroy_worker().<br />
<br />
BUG: null-ptr-deref<br />
KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f]<br />
CPU: 5 PID: 961 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf-dirty<br />
RIP: 0010:kthread_destroy_worker+0x25/0xb0<br />
Call Trace:<br />
<br />
drm_vblank_init_release+0x124/0x220 [drm]<br />
? drm_crtc_vblank_restore+0x8b0/0x8b0 [drm]<br />
__drmm_add_action_or_reset+0x41/0x50 [drm]<br />
drm_vblank_init+0x282/0x310 [drm]<br />
vkms_init+0x35f/0x1000 [vkms]<br />
? 0xffffffffc4508000<br />
? lock_is_held_type+0xd7/0x130<br />
? __kmem_cache_alloc_node+0x1c2/0x2b0<br />
? lock_is_held_type+0xd7/0x130<br />
? 0xffffffffc4508000<br />
do_one_initcall+0xd0/0x4f0<br />
...<br />
do_syscall_64+0x35/0x80<br />
entry_SYSCALL_64_after_hwframe+0x46/0xb0
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.156 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



