Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconfig Netlink path can trigger a null pointer dereference. A call chain such as: tsconfig_prepare_data() -> dev_get_hwtstamp_phylib() -> vlan_hwtstamp_get() -> generic_hwtstamp_get_lower() -> generic_hwtstamp_ioctl_lower() results in generic_hwtstamp_ioctl_lower() being called with kernel_cfg->ifr as NULL. The generic_hwtstamp_ioctl_lower() function does not expect a NULL ifr and dereferences it, leading to a system crash. Fix this by adding a NULL check for kernel_cfg->ifr in generic_hwtstamp_ioctl_lower(). If ifr is NULL, return -EINVAL.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-04 | Updated 2025-12-04 | Assigner Linux

Product status

Default status
unaffected

6e9e2eed4f39d52edf5fd006409d211facf49f6b (git) before 8817f816ae41908e9625c0770c4af0dcdcc01238
affected

6e9e2eed4f39d52edf5fd006409d211facf49f6b (git) before f796a8dec9beafcc0f6f0d3478ed685a15c5e062
affected

Default status
affected

6.14
affected

Any version before 6.14
unaffected

6.17.10 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8817f816ae41908e9625c0770c4af0dcdcc01238

git.kernel.org/...c/f796a8dec9beafcc0f6f0d3478ed685a15c5e062

cve.org (CVE-2025-40255)

nvd.nist.gov (CVE-2025-40255)