First published: Wed Oct 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Set phy->enable_completion only when we wait for it pm8001_phy_control() populates the enable_completion pointer with a stack address, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and returns. The problem arises when a phy control response comes late. After 300 ms the pm8001_phy_control() function returns and the passed enable_completion stack address is no longer valid. Late phy control response invokes complete() on a dangling enable_completion pointer which leads to a kernel crash.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.51 | |
Linux Kernel | >=6.7<6.10.10 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1<=6.1.119-1 | 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47666 has not been explicitly assigned a severity rating, but it pertains to a vulnerability in the Linux kernel's handling of PHY_LINK_RESET and PHY_HARD_RESET.
To remediate CVE-2024-47666, update the Linux kernel to versions higher than 6.12.11-1.
CVE-2024-47666 affects Linux kernel versions between 6.7 and 6.6.51, as well as certain 5.10 and 6.1 versions.
CVE-2024-47666 may lead to improper handling of PHY reset operations, potentially resulting in system instability.
Currently, there is no known workaround for CVE-2024-47666, and updating to the fixed kernel version is the recommended action.