In the Linux kernel, the following vulnerability has been resolved:iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flushfxls8962af_fifo_flush() uses indio_dev->active_scan_mask (withiio_for_each_active_channel()) without making sure the indio_devstays in buffer mode.There is a race if indio_dev exits buffer mode in the middle of theinterrupt that flushes the fifo. Fix this by callingsynchronize_irq() to ensure that no interrupt is currently running whendisabling buffer mode.Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read[...]_find_first_bit_le from fxls8962af_fifo_flush+0x17c/0x290fxls8962af_fifo_flush from fxls8962af_interrupt+0x80/0x178fxls8962af_interrupt from irq_thread_fn+0x1c/0x7cirq_thread_fn from irq_thread+0x110/0x1f4irq_thread from kthread+0xe0/0xfckthread from ret_from_fork+0x14/0x2c
No PoCs from references.
- https://github.com/w4zu/Debian_security