In the Linux kernel, the following vulnerability has been resolved:
ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()
ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is
buggy, so changing the coalesce settings on a device where the driver
provides only _one_ of the callbacks results in a NULL pointer
dereference instead of an -EOPNOTSUPP.
Fix the condition so that the availability of both callbacks is
ensured. This also matches the netlink code.
Note that reproducing this requires some effort - it only affects the
legacy ioctl path, and needs a specific combination of driver options:
- have .get_coalesce() and .coalesce_supported but no
.set_coalesce(), or
- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't
cause the crash as it first attempts to call ethtool_get_coalesce()
and bails out on error.
References
Configurations
History
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827 - Patch | |
References | () https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6 - Patch |
10 Jun 2024, 19:23
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
References | () https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827 - Patch | |
References | () https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
24 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-24 15:15
Updated : 2024-11-21 06:36
NVD link : CVE-2021-47556
Mitre link : CVE-2021-47556
CVE.ORG link : CVE-2021-47556
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference