Description: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() References: Notes: carnil> Introduced in 6df7f764cd3c ("bpf, sockmap: Wake up polling after data copy"). carnil> Vulnerable versions: 6.1.32 6.3.6 6.4-rc4. Bugs: upstream: released (6.8-rc6) [4cd12c6065dfcdeba10f49949bffcf383b3952d8] 6.7-upstream-stable: released (6.7.7) [d61608a4e394f23e0dca099df9eb8e555453d949] 6.6-upstream-stable: released (6.6.19) [9b099ed46dcaf1403c531ff02c3d7400fa37fa26] 6.1-upstream-stable: released (6.1.80) [4588b13abcbd561ec67f5b3c1cb2eff690990a54] 5.10-upstream-stable: N/A "Vulnerable code not present" 4.19-upstream-stable: N/A "Vulnerable code not present" sid: released (6.7.7-1) 6.1-bookworm-security: released (6.1.82-1) 5.10-bullseye-security: N/A "Vulnerable code not present" 4.19-buster-security: N/A "Vulnerable code not present"