In the Linux kernel, the following vulnerability has been resolved:
ice: Don't process extts if PTP is disabled
The iceptpexttsevent() function can race with iceptp_release() and result in a NULL pointer dereference which leads to a kernel panic.
Panic occurs because the iceptpexttsevent() function calls ptpclock_event() with a NULL pointer. The ice driver has already released the PTP clock by the time the interrupt for the next external timestamp event occurs.
To fix this, modify the iceptpextts_event() function to check the PTP state and bail early if PTP is not ready.
[
{
"digest": {
"length": 579.0,
"function_hash": "181935519275611536656550182323186683372"
},
"target": {
"file": "drivers/net/ethernet/intel/ice/ice_ptp.c",
"function": "ice_ptp_extts_event"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"id": "CVE-2024-42107-92c89dc5",
"signature_version": "v1",
"signature_type": "Function",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"251399632824480573542812303564462130719",
"308703365474950238124729655373313097302",
"16420098409956964112711521810811037319"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/ethernet/intel/ice/ice_ptp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"id": "CVE-2024-42107-cbe94059",
"signature_version": "v1",
"signature_type": "Line",
"deprecated": false
}
]