Fixed
Created: Jul 4, 2025
Updated: Jul 14, 2025
Resolved Date: Jul 10, 2025
Found In Version: 10.24.33.1
Fix Version: 10.24.33.11
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]net: phy: clear phydev->devlink when the link is deleted[EOL][EOL]There is a potential crash issue when disabling and re-enabling the[EOL]network port. When disabling the network port, phy_detach() calls[EOL]device_link_del() to remove the device link, but it does not clear[EOL]phydev->devlink, so phydev->devlink is not a NULL pointer. Then the[EOL]network port is re-enabled, but if phy_attach_direct() fails before[EOL]calling device_link_add(), the code jumps to the "error" label and[EOL]calls phy_detach(). Since phydev->devlink retains the old value from[EOL]the previous attach/detach cycle, device_link_del() uses the old value,[EOL]which accesses a NULL pointer and causes a crash. The simplified crash[EOL]log is as follows.[EOL][EOL][ 24.702421] Call trace:[EOL][ 24.704856] device_link_put_kref+0x20/0x120[EOL][ 24.709124] device_link_del+0x30/0x48[EOL][ 24.712864] phy_detach+0x24/0x168[EOL][ 24.716261] phy_attach_direct+0x168/0x3a4[EOL][ 24.720352] phylink_fwnode_phy_connect+0xc8/0x14c[EOL][ 24.725140] phylink_of_phy_connect+0x1c/0x34[EOL][EOL]Therefore, phydev->devlink needs to be cleared when the device link is[EOL]deleted.
CREATE(Triage):(User=lchen-cn) [CVE-2025-38149 (https://nvd.nist.gov/vuln/detail/CVE-2025-38149)