Description
In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() If ipi_send_{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipi_send_verify() which is invoked from these functions does verify its 'data' parameter, resulting in a kernel oops in irq_data_get_affinity_mask() as the passed NULL pointer gets dereferenced. Add a missing NULL pointer check in ipi_send_verify()... Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Product status
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b (git) before 926aef60ea64cd9becf2829f7388f48dbe8bcb11
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b (git) before 7448c73d64075051f50caed2c62f46553b69ab8a
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b (git) before feabecaff5902f896531dde90646ca5dfa9d4f7d
4.6
Any version before 4.6
6.1.18 (semver)
6.2.5 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/926aef60ea64cd9becf2829f7388f48dbe8bcb11
git.kernel.org/...c/7448c73d64075051f50caed2c62f46553b69ab8a
git.kernel.org/...c/feabecaff5902f896531dde90646ca5dfa9d4f7d