In the Linux kernel, the following vulnerability has been resolved:
net: microchip: sparx5: Fix potential null-ptr-deref in sparx_stats_init() and sparx5_start()
sparx_stats_init() calls create_singlethread_workqueue() and not checked the ret value, which may return NULL. And a null-ptr-deref may happen:
sparx_stats_init() create_singlethread_workqueue() # failed, sparx5->stats_queue is NULL queue_delayed_work() queue_delayed_work_on() __queue_delayed_work() # warning here, but continue __queue_work() # access wq->flags, null-ptr-deref
Check the ret value and return -ENOMEM if it is NULL. So as sparx5_start().
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.14 | 5.15.80 |
| linux / linux_kernel | 5.16 | 6.0.10 |
| linux / linux_kernel | 6.1-rc1 | 6.1-rc1.x |
| linux / linux_kernel | 6.1-rc2 | 6.1-rc2.x |
| linux / linux_kernel | 6.1-rc3 | 6.1-rc3.x |
| linux / linux_kernel | 6.1-rc4 | 6.1-rc4.x |
| linux / linux_kernel | 6.1-rc5 | 6.1-rc5.x |