In the Linux kernel, the following vulnerability has been resolved:
ice: Don't process extts if PTP is disabled
The ice_ptp_extts_event() function can race with ice_ptp_release() and
result in a NULL pointer dereference which leads to a kernel panic.
Panic occurs because the ice_ptp_extts_event() function calls
ptp_clock_event() with a NULL pointer. The ice driver has already
released the PTP clock by the time the interrupt for the next external
timestamp event occurs.
To fix this, modify the ice_ptp_extts_event() function to check the
PTP state and bail early if PTP is not ready.
References
Configurations
Configuration 1 (hide)
|
History
08 Jan 2025, 21:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* |
|
CWE | CWE-476 CWE-367 |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b - Patch | |
References | () https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
Information
Published : 2024-07-30 08:15
Updated : 2025-01-08 21:32
NVD link : CVE-2024-42107
Mitre link : CVE-2024-42107
CVE.ORG link : CVE-2024-42107
JSON object : View
Products Affected
linux
- linux_kernel