CVE-2024-35891: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Fix potential null pointer dereference In lan8814_get_sig_rx() and lan8814_get_sig_tx() ptp_parse_header() may return NULL as ptp_header due to abnormal packet type or corrupted packet. Fix this bug by adding ptp_header check. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Analysis
Technical Summary
CVE-2024-35891 is a vulnerability identified in the Linux kernel's network PHY driver for Micrel LAN8814 devices. The issue arises in the functions lan8814_get_sig_rx() and lan8814_get_sig_tx(), which handle Precision Time Protocol (PTP) packet parsing. Specifically, the function ptp_parse_header() may return a NULL pointer when processing abnormal or corrupted packet types. The vulnerability is due to a missing NULL pointer check on the ptp_header pointer before it is dereferenced, which can lead to a null pointer dereference and consequently a kernel crash (denial of service). The root cause is improper handling of unexpected or malformed network packets in the PHY driver code. This bug was discovered by the Linux Verification Center using static analysis tools (SVACE). The fix involves adding appropriate NULL pointer checks to prevent dereferencing a NULL ptp_header pointer. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the Micrel LAN8814 PHY driver code prior to the patch date (May 2024). Since this is a kernel-level vulnerability, exploitation could impact system stability and availability but does not directly imply privilege escalation or data confidentiality compromise. However, denial of service at the kernel level can disrupt critical network services and infrastructure relying on precise timing and network communication.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected Micrel LAN8814 PHY driver, especially those involved in network infrastructure, telecommunications, industrial control systems, or any environment where PTP is used for time synchronization. The impact is mainly on system availability due to potential kernel crashes triggered by malformed or malicious network packets. This could lead to service interruptions, degraded network performance, or downtime in critical systems. Organizations relying on Linux-based network appliances, routers, or embedded devices using this PHY chip could be affected. While no direct data breach or privilege escalation is indicated, the denial of service could be exploited in targeted attacks to disrupt operations, particularly in sectors like finance, energy, transportation, and government services across Europe. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid future exploitation as attackers often develop exploits for kernel vulnerabilities once patches are released.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems using the Micrel LAN8814 PHY driver, especially those handling PTP traffic or critical network functions. 2) Apply the official Linux kernel patches that address CVE-2024-35891 as soon as they become available from trusted sources or Linux distribution vendors. 3) For embedded or network devices with this PHY chip, coordinate with hardware vendors to obtain firmware or kernel updates. 4) Implement network-level filtering to block or monitor abnormal or malformed PTP packets that could trigger the vulnerability, using intrusion detection/prevention systems tuned for PTP traffic anomalies. 5) Increase monitoring of kernel logs and system stability indicators to detect potential exploitation attempts or crashes. 6) Conduct thorough testing of patches in staging environments before deployment to avoid unintended disruptions. 7) Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation. These steps go beyond generic advice by focusing on the specific driver, packet types, and network protocols involved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-35891: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Fix potential null pointer dereference In lan8814_get_sig_rx() and lan8814_get_sig_tx() ptp_parse_header() may return NULL as ptp_header due to abnormal packet type or corrupted packet. Fix this bug by adding ptp_header check. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI-Powered Analysis
Technical Analysis
CVE-2024-35891 is a vulnerability identified in the Linux kernel's network PHY driver for Micrel LAN8814 devices. The issue arises in the functions lan8814_get_sig_rx() and lan8814_get_sig_tx(), which handle Precision Time Protocol (PTP) packet parsing. Specifically, the function ptp_parse_header() may return a NULL pointer when processing abnormal or corrupted packet types. The vulnerability is due to a missing NULL pointer check on the ptp_header pointer before it is dereferenced, which can lead to a null pointer dereference and consequently a kernel crash (denial of service). The root cause is improper handling of unexpected or malformed network packets in the PHY driver code. This bug was discovered by the Linux Verification Center using static analysis tools (SVACE). The fix involves adding appropriate NULL pointer checks to prevent dereferencing a NULL ptp_header pointer. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the Micrel LAN8814 PHY driver code prior to the patch date (May 2024). Since this is a kernel-level vulnerability, exploitation could impact system stability and availability but does not directly imply privilege escalation or data confidentiality compromise. However, denial of service at the kernel level can disrupt critical network services and infrastructure relying on precise timing and network communication.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected Micrel LAN8814 PHY driver, especially those involved in network infrastructure, telecommunications, industrial control systems, or any environment where PTP is used for time synchronization. The impact is mainly on system availability due to potential kernel crashes triggered by malformed or malicious network packets. This could lead to service interruptions, degraded network performance, or downtime in critical systems. Organizations relying on Linux-based network appliances, routers, or embedded devices using this PHY chip could be affected. While no direct data breach or privilege escalation is indicated, the denial of service could be exploited in targeted attacks to disrupt operations, particularly in sectors like finance, energy, transportation, and government services across Europe. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid future exploitation as attackers often develop exploits for kernel vulnerabilities once patches are released.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems using the Micrel LAN8814 PHY driver, especially those handling PTP traffic or critical network functions. 2) Apply the official Linux kernel patches that address CVE-2024-35891 as soon as they become available from trusted sources or Linux distribution vendors. 3) For embedded or network devices with this PHY chip, coordinate with hardware vendors to obtain firmware or kernel updates. 4) Implement network-level filtering to block or monitor abnormal or malformed PTP packets that could trigger the vulnerability, using intrusion detection/prevention systems tuned for PTP traffic anomalies. 5) Increase monitoring of kernel logs and system stability indicators to detect potential exploitation attempts or crashes. 6) Conduct thorough testing of patches in staging environments before deployment to avoid unintended disruptions. 7) Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation. These steps go beyond generic advice by focusing on the specific driver, packet types, and network protocols involved.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.113Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe37b0
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 5:10:44 PM
Last updated: 8/11/2025, 6:01:03 PM
Views: 13
Related Threats
CVE-2025-55581: n/a
UnknownCVE-2025-52085: n/a
UnknownCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighCVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.