We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort() A race can occur between the MCQ completion path and the abort handler: once a request completes, __blk_mq_free_request() sets rq->mq_hctx to NULL, meaning the subsequent ufshcd_mcq_req_to_hwq() call in ufshcd_mcq_abort() can return a NULL pointer. If this NULL pointer is dereferenced, the kernel will crash. Add a NULL check for the returned hwq pointer. If hwq is NULL, log an error and return FAILED, preventing a potential NULL-pointer dereference. As suggested by Bart, the ufshcd_cmd_inflight() check is removed. This is similar to the fix in commit 74736103fb41 ("scsi: ufs: core: Fix ufshcd_abort_one racing issue"). This is found by our static analysis tool KNighter.
Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Linuxgit.kernel.org/...c/d6979fabe812a168d5053e5a41d5a2e9b8afd7bf
git.kernel.org/...c/7d002f591486f5ef4bc02eb02025a53f931f0eb5
git.kernel.org/...c/47eec518aef3814f64a5da43df81bdd74d8c0041
git.kernel.org/...c/4c324085062919d4e21c69e5e78456dcec0052fe
Support options