In the Linux kernel, the following vulnerability has been resolved:wifi: cfg80211: init wiphy_work before allocating rfkill failssyzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1]After rfkill allocation fails, the wiphy release process will be performed,which will cause cfg80211_dev_free to access the uninitialized wiphy_workrelated data.Move the initialization of wiphy_work to before rfkill initialization toavoid this issue.[1]INFO: trying to register non-static key.The code is fine but needs lockdep annotation, or maybeyou didn't initialize this object before use?turning off the locking correctness validator.CPU: 0 UID: 0 PID: 5935 Comm: syz-executor550 Not tainted 6.14.0-rc6-syzkaller-00103-g4003c9e78778 #0Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014Call Trace:
No PoCs from references.
- https://github.com/w4zu/Debian_security