Skip to main content

CVE-2024-26600: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26600cvecve-2024-26600
Published: Sat Feb 24 2024 (02/24/2024, 14:56:55 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Ethernet gadget triggering a wakeup for example: configfs-gadget.g1 gadget.0: ECM Suspend configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup ... Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute ... PC is at 0x0 LR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc] ... musb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core] usb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether] eth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c dev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4 sch_direct_xmit from __dev_queue_xmit+0x334/0xd88 __dev_queue_xmit from arp_solicit+0xf0/0x268 arp_solicit from neigh_probe+0x54/0x7c neigh_probe from __neigh_event_send+0x22c/0x47c __neigh_event_send from neigh_resolve_output+0x14c/0x1c0 neigh_resolve_output from ip_finish_output2+0x1c8/0x628 ip_finish_output2 from ip_send_skb+0x40/0xd8 ip_send_skb from udp_send_skb+0x124/0x340 udp_send_skb from udp_sendmsg+0x780/0x984 udp_sendmsg from __sys_sendto+0xd8/0x158 __sys_sendto from ret_fast_syscall+0x0/0x58 Let's fix the issue by checking for send_srp() and set_vbus() before calling them. For USB peripheral only cases these both could be NULL.

AI-Powered Analysis

AILast updated: 06/29/2025, 21:10:27 UTC

Technical Analysis

CVE-2024-26600 is a vulnerability identified in the Linux kernel specifically affecting the phy-omap-usb2 driver component. The issue arises when the external PHY device, which works in conjunction with the phy-omap-usb2 driver, does not implement the send_srp() function. Despite the absence of this function, the kernel may still attempt to invoke send_srp(), leading to a NULL pointer dereference. This dereference occurs during operations such as an idle Ethernet gadget triggering a wakeup event, which can cause the kernel to crash or become unstable. The vulnerability is rooted in the failure to verify the existence of send_srp() and set_vbus() function pointers before calling them. The stack trace provided in the description shows the kernel attempting to execute code at address 0x0, which is indicative of a NULL pointer dereference, leading to a kernel panic or system crash. The fix involves adding checks to ensure these function pointers are not NULL before invocation, preventing the kernel from dereferencing a NULL pointer. This vulnerability affects Linux kernel versions identified by the commit hash 657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6 and potentially other versions that include the vulnerable phy-omap-usb2 driver implementation. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-26600 could be significant in environments where Linux-based systems utilize the affected phy-omap-usb2 USB PHY driver, particularly in embedded systems, network appliances, or IoT devices that rely on USB Ethernet gadgets. A successful exploitation could lead to a denial of service (DoS) condition by causing kernel crashes or reboots, disrupting critical network connectivity or device functionality. This could affect industrial control systems, telecommunications infrastructure, or enterprise networking equipment running Linux kernels with this vulnerability. Although the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be leveraged by attackers to cause operational disruptions or facilitate further attacks. The lack of known exploits suggests limited immediate risk, but the widespread use of Linux in European IT infrastructure means that unpatched systems could be vulnerable to accidental or intentional triggering of this flaw, impacting availability and reliability of services.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-26600. Specifically, kernel maintainers and system administrators should ensure that the phy-omap-usb2 driver is updated to a version that includes the NULL pointer checks for send_srp() and set_vbus() functions. For embedded and IoT devices where kernel updates may be less frequent, organizations should work with device vendors to obtain firmware updates or patches addressing this vulnerability. Additionally, monitoring kernel logs for signs of NULL pointer dereference crashes related to USB PHY operations can help detect attempts to trigger this vulnerability. Network segmentation and limiting access to devices running vulnerable kernels can reduce the attack surface. Implementing robust incident response procedures to quickly recover from kernel panics or device reboots will also mitigate operational impact. Finally, organizations should maintain an inventory of Linux-based devices and verify their kernel versions to identify systems at risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.128Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe414f

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 9:10:27 PM

Last updated: 7/28/2025, 12:41:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats