Bug 2320629 (CVE-2024-50023) - CVE-2024-50023 kernel: net: phy: Remove LED entry from LEDs list on unregister
Summary: CVE-2024-50023 kernel: net: phy: Remove LED entry from LEDs list on unregister
Keywords:
Status: NEW
Alias: CVE-2024-50023
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2320885
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-21 20:04 UTC by OSIDB Bzimport
Modified: 2025-05-13 08:31 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:6966 0 None None None 2025-05-13 08:31:19 UTC

Description OSIDB Bzimport 2024-10-21 20:04:38 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: phy: Remove LED entry from LEDs list on unregister

Commit c938ab4da0eb ("net: phy: Manual remove LEDs to ensure correct
ordering") correctly fixed a problem with using devm_ but missed
removing the LED entry from the LEDs list.

This cause kernel panic on specific scenario where the port for the PHY
is torn down and up and the kmod for the PHY is removed.

On setting the port down the first time, the assosiacted LEDs are
correctly unregistered. The associated kmod for the PHY is now removed.
The kmod is now added again and the port is now put up, the associated LED
are registered again.
On putting the port down again for the second time after these step, the
LED list now have 4 elements. With the first 2 already unregistered
previously and the 2 new one registered again.

This cause a kernel panic as the first 2 element should have been
removed.

Fix this by correctly removing the element when LED is unregistered.

Comment 1 Avinash Hanwate 2024-10-22 09:38:29 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/T

Comment 2 errata-xmlrpc 2025-05-13 08:31:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:6966 https://access.redhat.com/errata/RHSA-2025:6966


Note You need to log in before you can comment on or make changes to this bug.