CVE-2024-36887: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: e1000e: change usleep_range to udelay in PHY mdic access This is a partial revert of commit 6dbdd4de0362 ("e1000e: Workaround for sporadic MDI error on Meteor Lake systems"). The referenced commit used usleep_range inside the PHY access routines, which are sometimes called from an atomic context. This can lead to a kernel panic in some scenarios, such as cable disconnection and reconnection on vPro systems. Solve this by changing the usleep_range calls back to udelay.
AI Analysis
Technical Summary
CVE-2024-36887 is a vulnerability identified in the Linux kernel's e1000e network driver, specifically related to the handling of PHY (physical layer) MDIC (Management Data Input/Output Controller) access routines. The issue stems from the use of the usleep_range function within these routines, which are sometimes invoked in atomic contexts where sleeping is not permitted. The original commit (6dbdd4de0362) introduced a workaround for sporadic MDI errors on Intel Meteor Lake systems by replacing udelay calls with usleep_range. However, this change inadvertently caused kernel panics under certain conditions, such as cable disconnection and reconnection on systems using Intel vPro technology. The vulnerability arises because usleep_range can sleep, which is unsafe in atomic contexts, leading to kernel instability or crashes. The fix involves reverting the usleep_range calls back to udelay, which is a busy-wait delay function safe to use in atomic contexts, thereby preventing kernel panics triggered by improper sleep calls in critical code paths. This vulnerability affects specific Linux kernel versions containing the problematic commits and is relevant for systems running the e1000e driver, commonly used for Intel Gigabit Ethernet adapters. Although no known exploits are reported in the wild, the vulnerability can cause denial of service through kernel panics, impacting system availability.
Potential Impact
For European organizations, this vulnerability primarily threatens system stability and availability, especially for servers and endpoints using Intel Ethernet hardware with the affected Linux kernel versions. Kernel panics can lead to unexpected system reboots or crashes, disrupting critical services and operations. Organizations relying on Linux-based infrastructure with Intel network adapters, particularly those using Intel vPro systems, may experience network outages or degraded performance during cable events or network interface resets. This can affect data centers, cloud service providers, telecommunications infrastructure, and enterprise IT environments. The impact is more pronounced in environments requiring high availability and uptime, such as financial institutions, healthcare providers, and public sector organizations. While confidentiality and integrity are not directly compromised, the denial of service effect can indirectly affect business continuity and operational resilience.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that revert the usleep_range calls to udelay in the e1000e driver. This requires updating to the fixed kernel versions or backporting the patch if using long-term support kernels. Network administrators should audit their systems to identify those running affected kernel versions with Intel e1000e drivers, especially on Intel vPro hardware. In environments where immediate patching is not feasible, temporary mitigation could include avoiding physical network cable disconnections or reconnections on affected systems to reduce the risk of triggering kernel panics. Additionally, organizations should implement robust monitoring and alerting for kernel panics and network interface resets to enable rapid response. Testing patches in staging environments before production deployment is recommended to ensure compatibility and stability. Maintaining up-to-date firmware and drivers for Intel network hardware can also help reduce related issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-36887: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: e1000e: change usleep_range to udelay in PHY mdic access This is a partial revert of commit 6dbdd4de0362 ("e1000e: Workaround for sporadic MDI error on Meteor Lake systems"). The referenced commit used usleep_range inside the PHY access routines, which are sometimes called from an atomic context. This can lead to a kernel panic in some scenarios, such as cable disconnection and reconnection on vPro systems. Solve this by changing the usleep_range calls back to udelay.
AI-Powered Analysis
Technical Analysis
CVE-2024-36887 is a vulnerability identified in the Linux kernel's e1000e network driver, specifically related to the handling of PHY (physical layer) MDIC (Management Data Input/Output Controller) access routines. The issue stems from the use of the usleep_range function within these routines, which are sometimes invoked in atomic contexts where sleeping is not permitted. The original commit (6dbdd4de0362) introduced a workaround for sporadic MDI errors on Intel Meteor Lake systems by replacing udelay calls with usleep_range. However, this change inadvertently caused kernel panics under certain conditions, such as cable disconnection and reconnection on systems using Intel vPro technology. The vulnerability arises because usleep_range can sleep, which is unsafe in atomic contexts, leading to kernel instability or crashes. The fix involves reverting the usleep_range calls back to udelay, which is a busy-wait delay function safe to use in atomic contexts, thereby preventing kernel panics triggered by improper sleep calls in critical code paths. This vulnerability affects specific Linux kernel versions containing the problematic commits and is relevant for systems running the e1000e driver, commonly used for Intel Gigabit Ethernet adapters. Although no known exploits are reported in the wild, the vulnerability can cause denial of service through kernel panics, impacting system availability.
Potential Impact
For European organizations, this vulnerability primarily threatens system stability and availability, especially for servers and endpoints using Intel Ethernet hardware with the affected Linux kernel versions. Kernel panics can lead to unexpected system reboots or crashes, disrupting critical services and operations. Organizations relying on Linux-based infrastructure with Intel network adapters, particularly those using Intel vPro systems, may experience network outages or degraded performance during cable events or network interface resets. This can affect data centers, cloud service providers, telecommunications infrastructure, and enterprise IT environments. The impact is more pronounced in environments requiring high availability and uptime, such as financial institutions, healthcare providers, and public sector organizations. While confidentiality and integrity are not directly compromised, the denial of service effect can indirectly affect business continuity and operational resilience.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that revert the usleep_range calls to udelay in the e1000e driver. This requires updating to the fixed kernel versions or backporting the patch if using long-term support kernels. Network administrators should audit their systems to identify those running affected kernel versions with Intel e1000e drivers, especially on Intel vPro hardware. In environments where immediate patching is not feasible, temporary mitigation could include avoiding physical network cable disconnections or reconnections on affected systems to reduce the risk of triggering kernel panics. Additionally, organizations should implement robust monitoring and alerting for kernel panics and network interface resets to enable rapid response. Testing patches in staging environments before production deployment is recommended to ensure compatibility and stability. Maintaining up-to-date firmware and drivers for Intel network hardware can also help reduce related issues.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-30T15:25:07.065Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe258b
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 9:54:57 AM
Last updated: 8/15/2025, 6:28:43 AM
Views: 14
Related Threats
CVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8898: CWE-862 Missing Authorization in magepeopleteam E-cab Taxi Booking Manager for Woocommerce
CriticalCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.