Skip to main content

CVE-2024-35891: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35891cvecve-2024-35891
Published: Sun May 19 2024 (05/19/2024, 08:34:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Fix potential null pointer dereference In lan8814_get_sig_rx() and lan8814_get_sig_tx() ptp_parse_header() may return NULL as ptp_header due to abnormal packet type or corrupted packet. Fix this bug by adding ptp_header check. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/29/2025, 17:10:44 UTC

Technical Analysis

CVE-2024-35891 is a vulnerability identified in the Linux kernel's network PHY driver for Micrel LAN8814 devices. The issue arises in the functions lan8814_get_sig_rx() and lan8814_get_sig_tx(), which handle Precision Time Protocol (PTP) packet parsing. Specifically, the function ptp_parse_header() may return a NULL pointer when processing abnormal or corrupted packet types. The vulnerability is due to a missing NULL pointer check on the ptp_header pointer before it is dereferenced, which can lead to a null pointer dereference and consequently a kernel crash (denial of service). The root cause is improper handling of unexpected or malformed network packets in the PHY driver code. This bug was discovered by the Linux Verification Center using static analysis tools (SVACE). The fix involves adding appropriate NULL pointer checks to prevent dereferencing a NULL ptp_header pointer. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the Micrel LAN8814 PHY driver code prior to the patch date (May 2024). Since this is a kernel-level vulnerability, exploitation could impact system stability and availability but does not directly imply privilege escalation or data confidentiality compromise. However, denial of service at the kernel level can disrupt critical network services and infrastructure relying on precise timing and network communication.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected Micrel LAN8814 PHY driver, especially those involved in network infrastructure, telecommunications, industrial control systems, or any environment where PTP is used for time synchronization. The impact is mainly on system availability due to potential kernel crashes triggered by malformed or malicious network packets. This could lead to service interruptions, degraded network performance, or downtime in critical systems. Organizations relying on Linux-based network appliances, routers, or embedded devices using this PHY chip could be affected. While no direct data breach or privilege escalation is indicated, the denial of service could be exploited in targeted attacks to disrupt operations, particularly in sectors like finance, energy, transportation, and government services across Europe. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid future exploitation as attackers often develop exploits for kernel vulnerabilities once patches are released.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Identify Linux systems using the Micrel LAN8814 PHY driver, especially those handling PTP traffic or critical network functions. 2) Apply the official Linux kernel patches that address CVE-2024-35891 as soon as they become available from trusted sources or Linux distribution vendors. 3) For embedded or network devices with this PHY chip, coordinate with hardware vendors to obtain firmware or kernel updates. 4) Implement network-level filtering to block or monitor abnormal or malformed PTP packets that could trigger the vulnerability, using intrusion detection/prevention systems tuned for PTP traffic anomalies. 5) Increase monitoring of kernel logs and system stability indicators to detect potential exploitation attempts or crashes. 6) Conduct thorough testing of patches in staging environments before deployment to avoid unintended disruptions. 7) Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation. These steps go beyond generic advice by focusing on the specific driver, packet types, and network protocols involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.113Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe37b0

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 5:10:44 PM

Last updated: 8/11/2025, 6:01:03 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats