CVE-2024-35992: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds read access of 'gbe_phy_init_fix[fix_idx].addr' every iteration after 'fix_idx' reaches 'ARRAY_SIZE(gbe_phy_init_fix)'. Make sure 'gbe_phy_init[addr]' is used when all elements of 'gbe_phy_init_fix' array are handled. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Analysis
Technical Summary
CVE-2024-35992 is a vulnerability identified in the Linux kernel, specifically within the Marvell a3700-comphy PHY driver code. The issue is an out-of-bounds read caused by improper handling of array indices when accessing the 'gbe_phy_init_fix' array. The vulnerability arises because the code continues to read from the 'gbe_phy_init_fix[fix_idx].addr' element even after the index 'fix_idx' exceeds the bounds of the array, leading to an out-of-bounds read. This can result in the kernel reading memory locations beyond the intended array, potentially exposing sensitive kernel memory contents or causing undefined behavior. The fix involves ensuring that the code uses the 'gbe_phy_init[addr]' array correctly once all elements of 'gbe_phy_init_fix' have been processed, preventing the out-of-bounds access. This vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been publicly disclosed on May 20, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions identified by the commit hash 934337080c6c59b75db76b180b509f218640ad48, indicating a specific patch or kernel version lineage. Since this is a kernel-level vulnerability in a PHY driver, it affects systems running Linux kernels with the vulnerable Marvell a3700-comphy PHY driver enabled, which is typically found in embedded systems or specialized hardware using this PHY component.
Potential Impact
For European organizations, the impact of CVE-2024-35992 depends largely on their use of Linux-based systems incorporating the Marvell a3700-comphy PHY driver. This vulnerability could potentially lead to information disclosure through out-of-bounds reads, which might expose sensitive kernel memory or cause system instability. While no remote code execution or privilege escalation is indicated, the exposure of kernel memory could aid attackers in crafting further attacks or bypassing security mechanisms. Organizations relying on embedded Linux devices, network equipment, or specialized hardware using this PHY driver could face risks of system crashes or data leakage. Critical infrastructure sectors such as telecommunications, manufacturing, or IoT deployments in Europe that use affected hardware might be particularly vulnerable. However, since exploitation requires local access or specific hardware configurations, the threat surface is somewhat limited compared to more generic Linux kernel vulnerabilities. The absence of known exploits reduces immediate risk, but the disclosure necessitates timely patching to prevent future exploitation attempts.
Mitigation Recommendations
European organizations should first identify whether their Linux systems use the Marvell a3700-comphy PHY driver, particularly in embedded or network devices. This can be done by auditing kernel configurations and hardware inventories. Applying the official Linux kernel patches that address CVE-2024-35992 is the primary mitigation step. Since the vulnerability involves kernel code, upgrading to a patched kernel version or applying vendor-supplied updates is essential. For embedded devices where kernel upgrades may be challenging, organizations should consult hardware vendors for firmware updates or mitigations. Additionally, restricting local access to affected systems reduces the risk of exploitation, as the vulnerability requires local code execution or access. Monitoring system logs for unusual behavior and employing kernel integrity monitoring tools can help detect exploitation attempts. Network segmentation and strict access controls on devices running vulnerable kernels further reduce exposure. Finally, organizations should maintain an inventory of Linux kernel versions in use and subscribe to security advisories to respond promptly to future patches or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2024-35992: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds read access of 'gbe_phy_init_fix[fix_idx].addr' every iteration after 'fix_idx' reaches 'ARRAY_SIZE(gbe_phy_init_fix)'. Make sure 'gbe_phy_init[addr]' is used when all elements of 'gbe_phy_init_fix' array are handled. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI-Powered Analysis
Technical Analysis
CVE-2024-35992 is a vulnerability identified in the Linux kernel, specifically within the Marvell a3700-comphy PHY driver code. The issue is an out-of-bounds read caused by improper handling of array indices when accessing the 'gbe_phy_init_fix' array. The vulnerability arises because the code continues to read from the 'gbe_phy_init_fix[fix_idx].addr' element even after the index 'fix_idx' exceeds the bounds of the array, leading to an out-of-bounds read. This can result in the kernel reading memory locations beyond the intended array, potentially exposing sensitive kernel memory contents or causing undefined behavior. The fix involves ensuring that the code uses the 'gbe_phy_init[addr]' array correctly once all elements of 'gbe_phy_init_fix' have been processed, preventing the out-of-bounds access. This vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been publicly disclosed on May 20, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions identified by the commit hash 934337080c6c59b75db76b180b509f218640ad48, indicating a specific patch or kernel version lineage. Since this is a kernel-level vulnerability in a PHY driver, it affects systems running Linux kernels with the vulnerable Marvell a3700-comphy PHY driver enabled, which is typically found in embedded systems or specialized hardware using this PHY component.
Potential Impact
For European organizations, the impact of CVE-2024-35992 depends largely on their use of Linux-based systems incorporating the Marvell a3700-comphy PHY driver. This vulnerability could potentially lead to information disclosure through out-of-bounds reads, which might expose sensitive kernel memory or cause system instability. While no remote code execution or privilege escalation is indicated, the exposure of kernel memory could aid attackers in crafting further attacks or bypassing security mechanisms. Organizations relying on embedded Linux devices, network equipment, or specialized hardware using this PHY driver could face risks of system crashes or data leakage. Critical infrastructure sectors such as telecommunications, manufacturing, or IoT deployments in Europe that use affected hardware might be particularly vulnerable. However, since exploitation requires local access or specific hardware configurations, the threat surface is somewhat limited compared to more generic Linux kernel vulnerabilities. The absence of known exploits reduces immediate risk, but the disclosure necessitates timely patching to prevent future exploitation attempts.
Mitigation Recommendations
European organizations should first identify whether their Linux systems use the Marvell a3700-comphy PHY driver, particularly in embedded or network devices. This can be done by auditing kernel configurations and hardware inventories. Applying the official Linux kernel patches that address CVE-2024-35992 is the primary mitigation step. Since the vulnerability involves kernel code, upgrading to a patched kernel version or applying vendor-supplied updates is essential. For embedded devices where kernel upgrades may be challenging, organizations should consult hardware vendors for firmware updates or mitigations. Additionally, restricting local access to affected systems reduces the risk of exploitation, as the vulnerability requires local code execution or access. Monitoring system logs for unusual behavior and employing kernel integrity monitoring tools can help detect exploitation attempts. Network segmentation and strict access controls on devices running vulnerable kernels further reduce exposure. Finally, organizations should maintain an inventory of Linux kernel versions in use and subscribe to security advisories to respond promptly to future patches or related vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.147Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe23d1
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 9:10:12 AM
Last updated: 7/28/2025, 5:20:22 PM
Views: 11
Related Threats
CVE-2025-8961: Memory Corruption in LibTIFF
MediumCVE-2025-8960: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-8958: Stack-based Buffer Overflow in Tenda TX3
HighCVE-2025-8957: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-54707: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in RealMag777 MDTF
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.