In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
May 1, 2025
to the GitHub Advisory Database
•
Updated Nov 7, 2025
Description
Published by the National Vulnerability Database
May 1, 2025
Published to the GitHub Advisory Database
May 1, 2025
Last updated
Nov 7, 2025
In the Linux kernel, the following vulnerability has been resolved:
net: microchip: sparx5: Fix potential null-ptr-deref in sparx_stats_init() and sparx5_start()
sparx_stats_init() calls create_singlethread_workqueue() and not
checked the ret value, which may return NULL. And a null-ptr-deref may
happen:
sparx_stats_init()
create_singlethread_workqueue() # failed, sparx5->stats_queue is NULL
queue_delayed_work()
queue_delayed_work_on()
__queue_delayed_work() # warning here, but continue
__queue_work() # access wq->flags, null-ptr-deref
Check the ret value and return -ENOMEM if it is NULL. So as
sparx5_start().
References