CVE-2024-38593

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38593
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38593.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38593
Downstream
Related
Published
2024-06-19T13:45:44Z
Modified
2025-10-14T17:58:52.892268Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net: micrel: Fix receiving the timestamp in the frame for lan8841
Details

In the Linux kernel, the following vulnerability has been resolved:

net: micrel: Fix receiving the timestamp in the frame for lan8841

The blamed commit started to use the ptp workqueue to get the second part of the timestamp. And when the port was set down, then this workqueue is stopped. But if the config option NETWORKPHYTIMESTAMPING is not enabled, then the ptpclock is not initialized so then it would crash when it would try to access the delayed work. So then basically by setting up and then down the port, it would crash. The fix consists in checking if the ptpclock is initialized and only then cancel the delayed work.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc75549548482ed653c23f212544e58cb38ea980
Fixed
3ddf170e4a604f5d4d9459a36993f5e92b53e8b0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc75549548482ed653c23f212544e58cb38ea980
Fixed
3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc75549548482ed653c23f212544e58cb38ea980
Fixed
64a47cf634ae44e92be24ebc982410841093bd7b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc75549548482ed653c23f212544e58cb38ea980
Fixed
aea27a92a41dae14843f92c79e9e42d8f570105c

Affected versions

v6.*

v6.4
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.10
v6.8.11
v6.8.2
v6.8.3
v6.8.4
v6.8.5
v6.8.6
v6.8.7
v6.8.8
v6.8.9
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7
v6.9.1
v6.9.2

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "line_hashes": [
                    "33705518576456279085613227852240881175",
                    "339734901565707154912141490851986577944",
                    "137923465357270428600194592566993552403",
                    "286049855298751479600691999914130549837"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-2870db3d",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aea27a92a41dae14843f92c79e9e42d8f570105c",
            "deprecated": false,
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "digest": {
                "length": 161.0,
                "function_hash": "84170351194747054065778064691616502611"
            },
            "target": {
                "function": "lan8841_suspend",
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-4df67c8c",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975",
            "deprecated": false,
            "signature_type": "Function",
            "signature_version": "v1"
        },
        {
            "digest": {
                "length": 161.0,
                "function_hash": "84170351194747054065778064691616502611"
            },
            "target": {
                "function": "lan8841_suspend",
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-78439ab2",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64a47cf634ae44e92be24ebc982410841093bd7b",
            "deprecated": false,
            "signature_type": "Function",
            "signature_version": "v1"
        },
        {
            "digest": {
                "line_hashes": [
                    "33705518576456279085613227852240881175",
                    "339734901565707154912141490851986577944",
                    "137923465357270428600194592566993552403",
                    "286049855298751479600691999914130549837"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-a43b6f78",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ddf170e4a604f5d4d9459a36993f5e92b53e8b0",
            "deprecated": false,
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "digest": {
                "line_hashes": [
                    "33705518576456279085613227852240881175",
                    "339734901565707154912141490851986577944",
                    "137923465357270428600194592566993552403",
                    "286049855298751479600691999914130549837"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-aa00a42f",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64a47cf634ae44e92be24ebc982410841093bd7b",
            "deprecated": false,
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "digest": {
                "line_hashes": [
                    "33705518576456279085613227852240881175",
                    "339734901565707154912141490851986577944",
                    "137923465357270428600194592566993552403",
                    "286049855298751479600691999914130549837"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-dddc76d4",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975",
            "deprecated": false,
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "digest": {
                "length": 161.0,
                "function_hash": "84170351194747054065778064691616502611"
            },
            "target": {
                "function": "lan8841_suspend",
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-e4576430",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ddf170e4a604f5d4d9459a36993f5e92b53e8b0",
            "deprecated": false,
            "signature_type": "Function",
            "signature_version": "v1"
        },
        {
            "digest": {
                "length": 161.0,
                "function_hash": "84170351194747054065778064691616502611"
            },
            "target": {
                "function": "lan8841_suspend",
                "file": "drivers/net/phy/micrel.c"
            },
            "id": "CVE-2024-38593-ece73536",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aea27a92a41dae14843f92c79e9e42d8f570105c",
            "deprecated": false,
            "signature_type": "Function",
            "signature_version": "v1"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.6.33
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.12
Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.9.3