Description
In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect After the call to phy_disconnect() netdev->phydev is reset to NULL. So fixed_phy_unregister() would be called with a NULL pointer as argument. Therefore cache the phy_device before this call.
Product status
e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before ae59ec969c07c73f0610f8bd7e648f01e798d222
e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before 44bcd397ad9cd1a6b25fabb7f5edbee4fb0cfc2e
e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before 9ad90dd34b4e8e5be1e45a4559f4de0f14e53af2
e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before e88fbc30dda1cb7438515303704ceddb3ade4ecd
6.12
Any version before 6.12
6.12.43 (semver)
6.15.11 (semver)
6.16.2 (semver)
6.17 (original_commit_for_fix)
References
git.kernel.org/...c/ae59ec969c07c73f0610f8bd7e648f01e798d222
git.kernel.org/...c/44bcd397ad9cd1a6b25fabb7f5edbee4fb0cfc2e
git.kernel.org/...c/9ad90dd34b4e8e5be1e45a4559f4de0f14e53af2
git.kernel.org/...c/e88fbc30dda1cb7438515303704ceddb3ade4ecd