cve-2024-27047
Vulnerability from cvelistv5
Published
2024-05-01 12:54
Modified
2024-12-19 08:53
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: phy: fix phy_get_internal_delay accessing an empty array The phy_get_internal_delay function could try to access to an empty array in the case that the driver is calling phy_get_internal_delay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to "unable to handle kernel NULL pointer dereference at virtual address 0". To avoid this kernel oops, the test should be delay >= 0. As there is already delay < 0 test just before, the test could only be size == 0.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7adPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878bPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1aPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296bPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7adPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878bPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1aPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296bPatch
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlPatch
Impacted products
Vendor Product Version
Linux Linux Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Version: 92252eec913b2dd5e7b5de11ea3efa2e64d65cf4
Create a notification for this product.
   Linux Linux Version: 5.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-27047",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-09T18:38:46.768621Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:21:42.449Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T00:21:05.863Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/net/phy/phy_device.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "06dd21045a7e8bc8701b0ebedcd9a30a6325878b",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "0e939a002c8a7d66e60bd0ea6b281fb39d713c1a",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "589ec16174dd9378953b8232ae76fad0a96e1563",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "c0691de7df1d51482a52cac93b7fe82fd9dd296b",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
                  {
                     lessThan: "4469c0c5b14a0919f5965c7ceac96b523eb57b79",
                     status: "affected",
                     version: "92252eec913b2dd5e7b5de11ea3efa2e64d65cf4",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/net/phy/phy_device.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.9",
                  },
                  {
                     lessThan: "5.9",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.214",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.153",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.83",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.23",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.*",
                     status: "unaffected",
                     version: "6.7.11",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.8.*",
                     status: "unaffected",
                     version: "6.8.2",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.9",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: fix phy_get_internal_delay accessing an empty array\n\nThe phy_get_internal_delay function could try to access to an empty\narray in the case that the driver is calling phy_get_internal_delay\nwithout defining delay_values and rx-internal-delay-ps or\ntx-internal-delay-ps is defined to 0 in the device-tree.\nThis will lead to \"unable to handle kernel NULL pointer dereference at\nvirtual address 0\". To avoid this kernel oops, the test should be delay\n>= 0. As there is already delay < 0 test just before, the test could\nonly be size == 0.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T08:53:18.972Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b",
            },
            {
               url: "https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a",
            },
            {
               url: "https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
            },
            {
               url: "https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563",
            },
            {
               url: "https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b",
            },
            {
               url: "https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
            },
            {
               url: "https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79",
            },
         ],
         title: "net: phy: fix phy_get_internal_delay accessing an empty array",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-27047",
      datePublished: "2024-05-01T12:54:25.156Z",
      dateReserved: "2024-02-19T14:20:24.213Z",
      dateUpdated: "2024-12-19T08:53:18.972Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-27047\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T13:15:49.930\",\"lastModified\":\"2024-12-23T19:14:13.317\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: phy: fix phy_get_internal_delay accessing an empty array\\n\\nThe phy_get_internal_delay function could try to access to an empty\\narray in the case that the driver is calling phy_get_internal_delay\\nwithout defining delay_values and rx-internal-delay-ps or\\ntx-internal-delay-ps is defined to 0 in the device-tree.\\nThis will lead to \\\"unable to handle kernel NULL pointer dereference at\\nvirtual address 0\\\". To avoid this kernel oops, the test should be delay\\n>= 0. As there is already delay < 0 test just before, the test could\\nonly be size == 0.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:phy: fix phy_get_internal_delay accediendo a un array vacío La función phy_get_internal_delay podría intentar acceder a un array vacío en el caso de que el driver esté llamando a phy_get_internal_delay sin definir delay_values y rx-internal- delay-ps o tx-internal-delay-ps se define en 0 en el árbol de dispositivos. Esto provocará que \\\"no se pueda manejar la desreferencia del puntero NULL del kernel en la dirección virtual 0\\\". Para evitar este problema del kernel, la prueba debe tener un retraso &gt;= 0. Como ya hay un retraso &lt; 0 en la prueba justo antes, la prueba solo podría tener un tamaño == 0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.9\",\"versionEndExcluding\":\"5.10.214\",\"matchCriteriaId\":\"A73BE1C2-BC30-4A60-80F0-7975135EB641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.153\",\"matchCriteriaId\":\"ACB69438-845D-4E3C-B114-3140611F9C0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.83\",\"matchCriteriaId\":\"121A07F6-F505-4C47-86BF-9BB6CC7B6C19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.23\",\"matchCriteriaId\":\"E00814DC-0BA7-431A-9926-80FEB4A96C68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.11\",\"matchCriteriaId\":\"9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.8\",\"versionEndExcluding\":\"6.8.2\",\"matchCriteriaId\":\"543A75FF-25B8-4046-A514-1EA8EDD87AB1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:21:05.863Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27047\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-09T18:38:46.768621Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:39.709Z\"}}], \"cna\": {\"title\": \"net: phy: fix phy_get_internal_delay accessing an empty array\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"06dd21045a7e8bc8701b0ebedcd9a30a6325878b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"2a2ff709511617de9c6c072eeee82bcbbdfecaf8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"589ec16174dd9378953b8232ae76fad0a96e1563\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"c0691de7df1d51482a52cac93b7fe82fd9dd296b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"92252eec913b2dd5e7b5de11ea3efa2e64d65cf4\", \"lessThan\": \"4469c0c5b14a0919f5965c7ceac96b523eb57b79\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/phy/phy_device.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.214\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.153\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.83\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.23\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.11\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.8.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/phy/phy_device.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b\"}, {\"url\": \"https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a\"}, {\"url\": \"https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8\"}, {\"url\": \"https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563\"}, {\"url\": \"https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b\"}, {\"url\": \"https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad\"}, {\"url\": \"https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: phy: fix phy_get_internal_delay accessing an empty array\\n\\nThe phy_get_internal_delay function could try to access to an empty\\narray in the case that the driver is calling phy_get_internal_delay\\nwithout defining delay_values and rx-internal-delay-ps or\\ntx-internal-delay-ps is defined to 0 in the device-tree.\\nThis will lead to \\\"unable to handle kernel NULL pointer dereference at\\nvirtual address 0\\\". To avoid this kernel oops, the test should be delay\\n>= 0. As there is already delay < 0 test just before, the test could\\nonly be size == 0.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:53:18.972Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-27047\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:53:18.972Z\", \"dateReserved\": \"2024-02-19T14:20:24.213Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-01T12:54:25.156Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.