Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cp4f-3979-2g6x

Опубликовано: 30 июл. 2024
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

igc: fix a log entry using uninitialized netdev

During successful probe, igc logs this:

[ 5.133667] igc 0000:01:00.0 (unnamed net_device) (uninitialized): PHC added ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The reason is that igc_ptp_init() is called very early, even before register_netdev() has been called. So the netdev_info() call works on a partially uninitialized netdev.

Fix this by calling igc_ptp_init() after register_netdev(), right after the media autosense check, just as in igb. Add a comment, just as in igb.

Now the log message is fine:

[ 5.200987] igc 0000:01:00.0 eth0: PHC added

In the Linux kernel, the following vulnerability has been resolved:

igc: fix a log entry using uninitialized netdev

During successful probe, igc logs this:

[ 5.133667] igc 0000:01:00.0 (unnamed net_device) (uninitialized): PHC added ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The reason is that igc_ptp_init() is called very early, even before register_netdev() has been called. So the netdev_info() call works on a partially uninitialized netdev.

Fix this by calling igc_ptp_init() after register_netdev(), right after the media autosense check, just as in igb. Add a comment, just as in igb.

Now the log message is fine:

[ 5.200987] igc 0000:01:00.0 eth0: PHC added

Связанные уязвимости

CVSS3: 4.4
redhat
11 месяцев назад

A vulnerability was found in the igc_probe() function in the Linux kernel's igc driver, where an uninitialized netdev is logged during the probe process. This occurs because the igc_ptp_init() function is called before the netdev() register is called, resulting in a misleading log entry.

nvd
11 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

oracle-oval
9 месяцев назад

ELSA-2024-12618: Unbreakable Enterprise kernel security update (IMPORTANT)