Skip to main content

CVE-2024-27047: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-27047cvecve-2024-27047
Published: Wed May 01 2024 (05/01/2024, 12:54:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: phy: fix phy_get_internal_delay accessing an empty array The phy_get_internal_delay function could try to access to an empty array in the case that the driver is calling phy_get_internal_delay without defining delay_values and rx-internal-delay-ps or tx-internal-delay-ps is defined to 0 in the device-tree. This will lead to "unable to handle kernel NULL pointer dereference at virtual address 0". To avoid this kernel oops, the test should be delay >= 0. As there is already delay < 0 test just before, the test could only be size == 0.

AI-Powered Analysis

AILast updated: 06/29/2025, 14:42:30 UTC

Technical Analysis

CVE-2024-27047 is a vulnerability identified in the Linux kernel's PHY (physical layer) network driver subsystem. Specifically, the issue arises in the function phy_get_internal_delay, which is responsible for retrieving internal delay parameters related to physical network interfaces. The vulnerability occurs when this function attempts to access an empty array due to improper handling of delay values. This situation can happen if the driver calls phy_get_internal_delay without defining the delay_values array, or if the device-tree properties rx-internal-delay-ps or tx-internal-delay-ps are set to zero. Under these conditions, the function tries to dereference a NULL pointer, leading to a kernel oops—a critical error that causes the kernel to crash or become unstable. The root cause is the absence of a check for the array size being zero before accessing it. The fix involves adding a condition to verify that the size of the delay_values array is not zero before accessing it, preventing the NULL pointer dereference and subsequent kernel crash. This vulnerability is a denial-of-service (DoS) type, as it can cause system instability or crash when triggered. It does not appear to allow privilege escalation or arbitrary code execution. No known exploits are currently reported in the wild. The vulnerability affects certain versions of the Linux kernel identified by specific commit hashes, indicating it is relevant to systems running these kernel versions or derivatives thereof. Since the Linux kernel is widely used across many distributions and devices, the impact can be broad depending on deployment scenarios.

Potential Impact

For European organizations, the impact of CVE-2024-27047 primarily concerns system availability and stability. Systems running vulnerable Linux kernel versions with affected PHY drivers may experience kernel crashes or reboots if the vulnerability is triggered, potentially disrupting network connectivity and critical services. This can affect servers, network appliances, embedded devices, and IoT infrastructure that rely on Linux-based systems with PHY drivers configured via device trees. In sectors such as telecommunications, manufacturing, critical infrastructure, and cloud service providers, such disruptions could lead to operational downtime, loss of productivity, and increased incident response costs. Although this vulnerability does not directly compromise confidentiality or integrity, the denial-of-service impact could be leveraged as part of a broader attack chain to degrade service or cause outages. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the kernel oops. Organizations with large Linux deployments, especially those using custom or embedded Linux kernels, should be particularly vigilant.

Mitigation Recommendations

To mitigate CVE-2024-27047, European organizations should: 1) Identify all Linux systems running affected kernel versions or custom kernels derived from these commits, focusing on those using PHY drivers with device-tree configurations for internal delays. 2) Apply the official Linux kernel patches or updates that include the fix for this vulnerability as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 3) For embedded or custom Linux environments, coordinate with device manufacturers or internal development teams to integrate the patch into firmware or kernel builds. 4) Implement monitoring for kernel oops or unexpected reboots related to network drivers to detect potential exploitation or accidental triggering. 5) Conduct configuration reviews of device-tree parameters (rx-internal-delay-ps and tx-internal-delay-ps) to ensure they are not set to zero or left undefined in a way that could trigger the vulnerability. 6) Employ network segmentation and access controls to limit exposure of vulnerable systems to untrusted networks, reducing the risk of remote triggering. 7) Maintain an incident response plan that includes procedures for handling Linux kernel crashes and service disruptions. These steps go beyond generic patching advice by emphasizing configuration audits, monitoring, and tailored response strategies for affected Linux PHY drivers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.213Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe31ea

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 2:42:30 PM

Last updated: 7/28/2025, 4:55:41 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats