In the Linux kernel, the following vulnerability has been resolved:
kobject: Add sanity check for kset->kobj.ktype in kset_register()
When I register a kset in the following way: static struct kset my_kset; kobject_set_name(&my_kset.kobj, "my_kset"); ret = kset_register(&my_kset);
A null pointer dereference exception is occurred:
[ 4453.568337] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000028
... ...
[ 4453.810361] Call trace:
[ 4453.813062] kobject_get_ownership+0xc/0x34
[ 4453.817493] kobject_add_internal+0x98/0x274
[ 4453.822005] kset_register+0x5c/0xb4
[ 4453.825820] my_kobj_init+0x44/0x1000 [my_kset]
... ...
Because I didn't initialize my_kset.kobj.ktype.
According to the description in Documentation/core-api/kobject.rst:
So add sanity check to make sure kset->kobj.ktype is not NULL.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 4.19 | 4.19.295 |
| linux / linux_kernel | 4.20 | 5.4.257 |
| linux / linux_kernel | 5.5 | 5.10.197 |
| linux / linux_kernel | 5.11 | 5.15.133 |
| linux / linux_kernel | 5.16 | 6.1.55 |
| linux / linux_kernel | 6.2 | 6.5.5 |