In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails
When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 4.4 | 4.19.256 |
| linux / linux_kernel | 4.20 | 5.4.211 |
| linux / linux_kernel | 5.5 | 5.10.137 |
| linux / linux_kernel | 5.11 | 5.15.61 |
| linux / linux_kernel | 5.16 | 5.18.18 |
| linux / linux_kernel | 5.19 | 5.19.2 |