In the Linux kernel, the following vulnerability has been resolved:
net: phy: fix phygetinternal_delay accessing an empty array
The phygetinternaldelay function could try to access to an empty array in the case that the driver is calling phygetinternaldelay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to "unable to handle kernel NULL pointer dereference at virtual address 0". To avoid this kernel oops, the test should be delay
= 0. As there is already delay < 0 test just before, the test could only be size == 0.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1160.0,
"function_hash": "104167563329157527553591605645214347141"
},
"target": {
"file": "drivers/net/phy/phy_device.c",
"function": "phy_get_internal_delay"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0691de7df1d51482a52cac93b7fe82fd9dd296b",
"signature_version": "v1",
"id": "CVE-2024-27047-0e38aeb7"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1160.0,
"function_hash": "104167563329157527553591605645214347141"
},
"target": {
"file": "drivers/net/phy/phy_device.c",
"function": "phy_get_internal_delay"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
"signature_version": "v1",
"id": "CVE-2024-27047-4548f7f6"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"301868317630222209846955061108596470805",
"124135321110498106923993596018175730101",
"249414939499550471549357921214698215263",
"186299299659937444624040083336851556205"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/phy/phy_device.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0307cf443308ecc6be9b2ca312bb31bae5e5a7ad",
"signature_version": "v1",
"id": "CVE-2024-27047-488b4850"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"301868317630222209846955061108596470805",
"124135321110498106923993596018175730101",
"249414939499550471549357921214698215263",
"186299299659937444624040083336851556205"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/phy/phy_device.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0691de7df1d51482a52cac93b7fe82fd9dd296b",
"signature_version": "v1",
"id": "CVE-2024-27047-676211b0"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1160.0,
"function_hash": "104167563329157527553591605645214347141"
},
"target": {
"file": "drivers/net/phy/phy_device.c",
"function": "phy_get_internal_delay"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
"signature_version": "v1",
"id": "CVE-2024-27047-768fe2e8"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"301868317630222209846955061108596470805",
"124135321110498106923993596018175730101",
"249414939499550471549357921214698215263",
"186299299659937444624040083336851556205"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/phy/phy_device.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4469c0c5b14a0919f5965c7ceac96b523eb57b79",
"signature_version": "v1",
"id": "CVE-2024-27047-8d38059f"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"301868317630222209846955061108596470805",
"124135321110498106923993596018175730101",
"249414939499550471549357921214698215263",
"186299299659937444624040083336851556205"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/phy/phy_device.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a2ff709511617de9c6c072eeee82bcbbdfecaf8",
"signature_version": "v1",
"id": "CVE-2024-27047-95eb6eeb"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1160.0,
"function_hash": "104167563329157527553591605645214347141"
},
"target": {
"file": "drivers/net/phy/phy_device.c",
"function": "phy_get_internal_delay"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4469c0c5b14a0919f5965c7ceac96b523eb57b79",
"signature_version": "v1",
"id": "CVE-2024-27047-bf4d6102"
}
]