Skip to main content

CVE-2024-26714: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26714cvecve-2024-26714
Published: Wed Apr 03 2024 (04/03/2024, 14:55:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive The CO0 BCM needs to be up at all times, otherwise some hardware (like the UFS controller) loses its connection to the rest of the SoC, resulting in a hang of the platform, accompanied by a spectacular logspam. Mark it as keepalive to prevent such cases.

AI-Powered Analysis

AILast updated: 06/29/2025, 17:42:08 UTC

Technical Analysis

CVE-2024-26714 is a vulnerability identified in the Linux kernel specifically related to the interconnect driver for Qualcomm's SC8180x platform. The issue concerns the CO0 BCM (Bus Clock Manager) component, which is critical for maintaining the operational state of certain hardware elements, notably the UFS (Universal Flash Storage) controller. The vulnerability arises because the CO0 BCM was not marked as a keepalive resource, meaning it could be powered down or become inactive under certain conditions. When this happens, the UFS controller loses its connection to the rest of the System on Chip (SoC), causing the entire platform to hang and generating extensive log spam. This results in a denial of service condition due to the system becoming unresponsive. The fix involves marking the CO0 BCM as a keepalive resource to ensure it remains active continuously, preventing the UFS controller from losing connectivity and thus avoiding system hangs. This vulnerability is specific to the Linux kernel versions incorporating the affected Qualcomm SC8180x interconnect driver code. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability primarily impacts embedded or mobile devices using this specific SoC and Linux kernel combination, rather than general-purpose Linux distributions on desktops or servers.

Potential Impact

For European organizations, the impact of CVE-2024-26714 depends largely on their use of devices or embedded systems running Linux on Qualcomm SC8180x platforms. This SoC is commonly found in certain mobile devices, IoT devices, and embedded systems. Organizations relying on such hardware for critical operations—such as telecommunications infrastructure, industrial control systems, or mobile device fleets—may experience system hangs leading to operational disruptions. The denial of service caused by the platform hang could result in downtime, loss of productivity, and potential data loss if systems become unresponsive during critical operations. While this vulnerability does not directly expose data or allow remote code execution, the loss of availability can have cascading effects, especially in environments requiring high uptime or real-time responsiveness. Given the specificity of the hardware involved, the threat is more pronounced in sectors utilizing embedded Linux devices with Qualcomm SC8180x chips rather than general IT infrastructure. The absence of known exploits reduces immediate risk, but organizations should remain vigilant and prioritize patching to prevent potential future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-26714, organizations should: 1) Identify all devices and embedded systems running Linux kernels with Qualcomm SC8180x interconnect drivers, particularly those using the affected versions. 2) Apply the official Linux kernel patches that mark the CO0 BCM as a keepalive resource as soon as they become available from trusted sources or vendor updates. 3) For devices where kernel updates are not immediately feasible, consider implementing monitoring solutions to detect system hangs or abnormal log activity indicative of this issue. 4) Engage with hardware and device vendors to confirm patch availability and deployment timelines. 5) In critical environments, plan for controlled reboots or failover mechanisms to minimize downtime if a hang occurs. 6) Maintain an inventory of embedded Linux devices and their kernel versions to facilitate rapid response to similar vulnerabilities in the future. These steps go beyond generic advice by focusing on the specific hardware-software combination and operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.160Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe38f0

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 5:42:08 PM

Last updated: 7/28/2025, 10:51:43 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats