Bug 2301504 (CVE-2024-42139) - CVE-2024-42139 kernel: ice: Fix improper extts handling
Summary: CVE-2024-42139 kernel: ice: Fix improper extts handling
Keywords:
Status: NEW
Alias: CVE-2024-42139
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2301997
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-30 08:37 UTC by OSIDB Bzimport
Modified: 2025-05-05 13:16 UTC (History)
4 users (show)

Fixed In Version: kernel 6.9.9, kernel 6.10
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:7004 0 None None None 2024-09-24 01:35:11 UTC
Red Hat Product Errata RHSA-2024:7005 0 None None None 2024-09-24 00:47:19 UTC

Description OSIDB Bzimport 2024-07-30 08:37:21 UTC
In the Linux kernel, the following vulnerability has been resolved:

ice: Fix improper extts handling

Extts events are disabled and enabled by the application ts2phc.
However, in case where the driver is removed when the application is
running, a specific extts event remains enabled and can cause a kernel
crash.
As a side effect, when the driver is reloaded and application is started
again, remaining extts event for the channel from a previous run will
keep firing and the message "extts on unexpected channel" might be
printed to the user.

To avoid that, extts events shall be disabled when PTP is released.

Comment 1 Mauro Matteo Cascella 2024-07-31 10:21:51 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024073030-CVE-2024-42139-f8ef@gregkh/T

Comment 3 Mauro Matteo Cascella 2024-07-31 10:22:16 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2301997]

Comment 12 errata-xmlrpc 2024-09-24 00:47:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:7005 https://access.redhat.com/errata/RHSA-2024:7005

Comment 13 errata-xmlrpc 2024-09-24 01:35:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:7004 https://access.redhat.com/errata/RHSA-2024:7004


Note You need to log in before you can comment on or make changes to this bug.