Impact
In the Linux kernel, a call to ixp4xx_get_ts_info() executed ixp46x_ptp_find() unconditionally, dereferencing a NULL pointer on systems that do not support IXP46x PTP. The resulting kernel panic manifests as a segmentation fault when an ethtool command is run, causing a denial of service. This flaw stems from improper validation of the device type and is represented by CWE‑476.
Affected Systems
The vulnerability impacts all Linux kernel releases that contain the ixp4xx Ethernet driver and have not been patched to include the defensive check for IXP46x support. Systems running XScale IXP processors and any distribution‑supplied kernel that exposes the ethtool timestamp interface are vulnerable. The advisory does not list exact version ranges; applying a kernel that incorporates commit 144dde3146985b25fa84d4e4b7c3d11e0f5fc5a4 or later resolves the issue.
Risk and Exploitability
The CVSS score is not publicly disclosed and the EPSS score is unavailable, but the flaw can trigger a kernel crash, leading to a local denial of service. Exploitation requires the ability to issue ethtool commands or otherwise invoke the timestamp query, so the attack vector is likely local or remote through the network interface. The vulnerability is not listed in the CISA KEV catalog, indicating no widespread exploitation has been reported. Updating the kernel remains the most effective mitigation.
OpenCVE Enrichment