摘要:
In the Linux kernel, the following vulnerability has been resolved:ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()ethtool_set_coalesce() now uses both the .get_coalesce() and.set_coalesce() callbacks. But the check for their availability isbuggy, so changing the coalesce settings on a device where the driverprovides only _one_ of the callbacks results in a NULL pointerdereference instead of an -EOPNOTSUPP.Fix the condition so that the availability of both callbacks isensured. This also matches the netlink code.Note that reproducing this requires some effort - it only affects thelegacy ioctl path, and needs a specific combination of driver options:- have .get_coalesce() and .coalesce_supported but no .set_coalesce(), or- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn t cause the crash as it first attempts to call ethtool_get_coalesce() and bails out on error.
安全等级: Low
公告ID: KylinSec-SA-2024-2895
发布日期: 2024年6月26日
关联CVE: CVE-2021-47556
In the Linux kernel, the following vulnerability has been resolved:ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()ethtool_set_coalesce() now uses both the .get_coalesce() and.set_coalesce() callbacks. But the check for their availability isbuggy, so changing the coalesce settings on a device where the driverprovides only _one_ of the callbacks results in a NULL pointerdereference instead of an -EOPNOTSUPP.Fix the condition so that the availability of both callbacks isensured. This also matches the netlink code.Note that reproducing this requires some effort - it only affects thelegacy ioctl path, and needs a specific combination of driver options:- have .get_coalesce() and .coalesce_supported but no .set_coalesce(), or- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn t cause the crash as it first attempts to call ethtool_get_coalesce() and bails out on error.
cve名称 | 产品 | 组件 | 是否受影响 |
---|