Home

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix potential null dereference on pointer status There are calls to idxd_cmd_exec that pass a null status pointer however a recent commit has added an assignment to *status that can end up with a null pointer dereference. The function expects a null status pointer sometimes as there is a later assignment to *status where status is first null checked. Fix the issue by null checking status before making the assignment. Addresses-Coverity: ("Explicit null dereferenced")

PUBLISHED Reserved 2024-02-27 | Published 2024-02-28 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

40e3b5c128645d2ddad12310c7be98758cafb2b0 (git) before 5756f757c72501ef1a16f5f63f940623044180e9
affected

89e3becd8f821e507052e012d2559dcda59f538e (git) before 2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97
affected

89e3becd8f821e507052e012d2559dcda59f538e (git) before 7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa
affected

89e3becd8f821e507052e012d2559dcda59f538e (git) before 28ac8e03c43dfc6a703aa420d18222540b801120
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.10.38 (semver)
unaffected

5.11.22 (semver)
unaffected

5.12.5 (semver)
unaffected

5.13 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5756f757c72501ef1a16f5f63f940623044180e9

git.kernel.org/...c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97

git.kernel.org/...c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa

git.kernel.org/...c/28ac8e03c43dfc6a703aa420d18222540b801120

git.kernel.org/...c/5756f757c72501ef1a16f5f63f940623044180e9

git.kernel.org/...c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97

git.kernel.org/...c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa

git.kernel.org/...c/28ac8e03c43dfc6a703aa420d18222540b801120

cve.org (CVE-2021-47003)

nvd.nist.gov (CVE-2021-47003)