Description
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix possible dereference of uninitialized pointer There is a pointer head_page in rb_meta_validate_events() which is not initialized at the beginning of a function. This pointer can be dereferenced if there is a failure during reader page validation. In this case the control is passed to "invalid" label where the pointer is dereferenced in a loop. To fix the issue initialize orig_head and head_page before calling rb_validate_buffer. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Product status
5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 (git) before bc77986f3cb7476637052edf2d87137fa39f153d
5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 (git) before d9942396845fef2369478c157b26738fe07142f6
5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 (git) before f1547779402c4cd67755c33616b7203baa88420b
6.12
Any version before 6.12
6.18.16 (semver)
6.19.6 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/bc77986f3cb7476637052edf2d87137fa39f153d
git.kernel.org/...c/d9942396845fef2369478c157b26738fe07142f6
git.kernel.org/...c/f1547779402c4cd67755c33616b7203baa88420b