CVE-2024-27047
Vulnerability from cvelistv5
Published
2024-05-01 12:54
Modified
2024-12-19 08:53
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: phy: fix phy_get_internal_delay accessing an empty array The phy_get_internal_delay function could try to access to an empty array in the case that the driver is calling phy_get_internal_delay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to "unable to handle kernel NULL pointer dereference at virtual address 0". To avoid this kernel oops, the test should be delay >= 0. As there is already delay < 0 test just before, the test could only be size == 0.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Impacted products
Vendor Product Version
Linux Linux Version: 5.9
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27047",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T18:38:46.768621Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:42.449Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:21:05.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/phy/phy_device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "06dd21045a7e8bc8701b0ebedcd9a30a6325878b",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "0e939a002c8a7d66e60bd0ea6b281fb39d713c1a",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "589ec16174dd9378953b8232ae76fad0a96e1563",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "c0691de7df1d51482a52cac93b7fe82fd9dd296b",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            },
            {
              "lessThan": "4469c0c5b14a0919f5965c7ceac96b523eb57b79",
              "status": "affected",
              "version": "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/phy/phy_device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.9"
            },
            {
              "lessThan": "5.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.214",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.153",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.83",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.23",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.7.*",
              "status": "unaffected",
              "version": "6.7.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: fix phy_get_internal_delay accessing an empty array\n\nThe phy_get_internal_delay function could try to access to an empty\narray in the case that the driver is calling phy_get_internal_delay\nwithout defining delay_values and rx-internal-delay-ps or\ntx-internal-delay-ps is defined to 0 in the device-tree.\nThis will lead to \"unable to handle kernel NULL pointer dereference at\nvirtual address 0\". To avoid this kernel oops, the test should be delay\n\u003e= 0. As there is already delay \u003c 0 test just before, the test could\nonly be size == 0."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:53:18.972Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b"
        },
        {
          "url": "https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a"
        },
        {
          "url": "https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8"
        },
        {
          "url": "https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563"
        },
        {
          "url": "https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b"
        },
        {
          "url": "https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad"
        },
        {
          "url": "https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79"
        }
      ],
      "title": "net: phy: fix phy_get_internal_delay accessing an empty array",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-27047",
    "datePublished": "2024-05-01T12:54:25.156Z",
    "dateReserved": "2024-02-19T14:20:24.213Z",
    "dateUpdated": "2024-12-19T08:53:18.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-27047\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T13:15:49.930\",\"lastModified\":\"2024-11-21T09:03:44.563\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: phy: fix phy_get_internal_delay accessing an empty array\\n\\nThe phy_get_internal_delay function could try to access to an empty\\narray in the case that the driver is calling phy_get_internal_delay\\nwithout defining delay_values and rx-internal-delay-ps or\\ntx-internal-delay-ps is defined to 0 in the device-tree.\\nThis will lead to \\\"unable to handle kernel NULL pointer dereference at\\nvirtual address 0\\\". To avoid this kernel oops, the test should be delay\\n\u003e= 0. As there is already delay \u003c 0 test just before, the test could\\nonly be size == 0.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:phy: fix phy_get_internal_delay accediendo a un array vac\u00edo La funci\u00f3n phy_get_internal_delay podr\u00eda intentar acceder a un array vac\u00edo en el caso de que el driver est\u00e9 llamando a phy_get_internal_delay sin definir delay_values y rx-internal- delay-ps o tx-internal-delay-ps se define en 0 en el \u00e1rbol de dispositivos. Esto provocar\u00e1 que \\\"no se pueda manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0\\\". Para evitar este problema del kernel, la prueba debe tener un retraso \u0026gt;= 0. Como ya hay un retraso \u0026lt; 0 en la prueba justo antes, la prueba solo podr\u00eda tener un tama\u00f1o == 0.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.