Description
In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconfig Netlink path can trigger a null pointer dereference. A call chain such as: tsconfig_prepare_data() -> dev_get_hwtstamp_phylib() -> vlan_hwtstamp_get() -> generic_hwtstamp_get_lower() -> generic_hwtstamp_ioctl_lower() results in generic_hwtstamp_ioctl_lower() being called with kernel_cfg->ifr as NULL. The generic_hwtstamp_ioctl_lower() function does not expect a NULL ifr and dereferences it, leading to a system crash. Fix this by adding a NULL check for kernel_cfg->ifr in generic_hwtstamp_ioctl_lower(). If ifr is NULL, return -EINVAL.
Product status
6e9e2eed4f39d52edf5fd006409d211facf49f6b (git) before 8817f816ae41908e9625c0770c4af0dcdcc01238
6e9e2eed4f39d52edf5fd006409d211facf49f6b (git) before f796a8dec9beafcc0f6f0d3478ed685a15c5e062
6.14
Any version before 6.14
6.17.10 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/8817f816ae41908e9625c0770c4af0dcdcc01238
git.kernel.org/...c/f796a8dec9beafcc0f6f0d3478ed685a15c5e062