In the Linux kernel, the following vulnerability has been resolved:
net: micrel: Fix receiving the timestamp in the frame for lan8841
The blamed commit started to use the ptp workqueue to get the second
part of the timestamp. And when the port was set down, then this
workqueue is stopped. But if the config option NETWORK_PHY_TIMESTAMPING
is not enabled, then the ptp_clock is not initialized so then it would
crash when it would try to access the delayed work.
So then basically by setting up and then down the port, it would crash.
The fix consists in checking if the ptp_clock is initialized and only
then cancel the delayed work.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-19T13:45:44.031Z
Updated: 2024-11-06T17:17:14.230Z
Reserved: 2024-06-18T19:36:34.931Z
Link: CVE-2024-38593
Vulnrichment
Updated: 2024-08-02T04:12:25.805Z
NVD
Status : Awaiting Analysis
Published: 2024-06-19T14:15:19.387
Modified: 2024-11-21T09:26:26.200
Link: CVE-2024-38593
Redhat