Home

Description

In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj.ktype in kset_register() When I register a kset in the following way: static struct kset my_kset; kobject_set_name(&my_kset.kobj, "my_kset"); ret = kset_register(&my_kset); A null pointer dereference exception is occurred: [ 4453.568337] Unable to handle kernel NULL pointer dereference at \ virtual address 0000000000000028 ... ... [ 4453.810361] Call trace: [ 4453.813062] kobject_get_ownership+0xc/0x34 [ 4453.817493] kobject_add_internal+0x98/0x274 [ 4453.822005] kset_register+0x5c/0xb4 [ 4453.825820] my_kobj_init+0x44/0x1000 [my_kset] ... ... Because I didn't initialize my_kset.kobj.ktype. According to the description in Documentation/core-api/kobject.rst: - A ktype is the type of object that embeds a kobject. Every structure that embeds a kobject needs a corresponding ktype. So add sanity check to make sure kset->kobj.ktype is not NULL.

PUBLISHED Reserved 2025-10-01 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1792eac72e27f676bf9ebde28a5afea627fb85f0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 039ec9db2d30032eafa365f5f89b30eca5322b05
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 964e025ceefdf75da46b0133d0c2790de451aeec
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5df5829158513134ddcaf2184d9286eda7b0bb18
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f3f6bf22a4f5ba649cf26ae4670de5c7f861bdef
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 48aebbe801e78a8932404c122ed0e880ccedc220
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1a772881bc059c596d8ca587cbd2a233edce3d3b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4d0fe8c52bb3029d83e323c961221156ab98680b
affected

Default status
affected

4.14.326
unaffected

4.19.295
unaffected

5.4.257
unaffected

5.10.197
unaffected

5.15.133
unaffected

6.1.55
unaffected

6.5.5
unaffected

6.6
unaffected

References

git.kernel.org/...c/1792eac72e27f676bf9ebde28a5afea627fb85f0

git.kernel.org/...c/039ec9db2d30032eafa365f5f89b30eca5322b05

git.kernel.org/...c/964e025ceefdf75da46b0133d0c2790de451aeec

git.kernel.org/...c/5df5829158513134ddcaf2184d9286eda7b0bb18

git.kernel.org/...c/f3f6bf22a4f5ba649cf26ae4670de5c7f861bdef

git.kernel.org/...c/48aebbe801e78a8932404c122ed0e880ccedc220

git.kernel.org/...c/1a772881bc059c596d8ca587cbd2a233edce3d3b

git.kernel.org/...c/4d0fe8c52bb3029d83e323c961221156ab98680b

cve.org (CVE-2023-53480)

nvd.nist.gov (CVE-2023-53480)

Download JSON