
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-47666 affects the Linux kernel's SCSI subsystem, specifically the pm80xx driver. The vulnerability was discovered in October 2024 and involves a use-after-free condition in the pm8001phycontrol() function. The issue affects Linux kernel versions up to (excluding) 6.6.51 and versions from 6.7 up to (excluding) 6.10.10 (NVD).
The vulnerability occurs in the pm8001phycontrol() function where it populates the enablecompletion pointer with a stack address, sends a PHYLINKRESET / PHYHARDRESET, waits 300 ms, and returns. When a phy control response comes late (after the 300ms timeout), the function returns while the enablecompletion stack address is no longer valid. This leads to a complete() call on a dangling enable_completion pointer. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability leads to a kernel crash due to the use of an invalid stack address, resulting in a denial of service condition. The vulnerability affects system availability but does not impact confidentiality or integrity (NVD).
The vulnerability has been fixed in the Linux kernel through patches that modify the pm80xx driver to set phy->enable_completion only when waiting for it. Fixed versions include Linux kernel 6.6.51 and later, and 6.10.10 and later. Users should update their systems to these patched versions (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."