CVE-2024-26714: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive The CO0 BCM needs to be up at all times, otherwise some hardware (like the UFS controller) loses its connection to the rest of the SoC, resulting in a hang of the platform, accompanied by a spectacular logspam. Mark it as keepalive to prevent such cases.
AI Analysis
Technical Summary
CVE-2024-26714 is a vulnerability identified in the Linux kernel specifically related to the interconnect driver for Qualcomm's SC8180x platform. The issue concerns the CO0 BCM (Bus Clock Manager) component, which is critical for maintaining the operational state of certain hardware elements, notably the UFS (Universal Flash Storage) controller. The vulnerability arises because the CO0 BCM was not marked as a keepalive resource, meaning it could be powered down or become inactive under certain conditions. When this happens, the UFS controller loses its connection to the rest of the System on Chip (SoC), causing the entire platform to hang and generating extensive log spam. This results in a denial of service condition due to the system becoming unresponsive. The fix involves marking the CO0 BCM as a keepalive resource to ensure it remains active continuously, preventing the UFS controller from losing connectivity and thus avoiding system hangs. This vulnerability is specific to the Linux kernel versions incorporating the affected Qualcomm SC8180x interconnect driver code. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability primarily impacts embedded or mobile devices using this specific SoC and Linux kernel combination, rather than general-purpose Linux distributions on desktops or servers.
Potential Impact
For European organizations, the impact of CVE-2024-26714 depends largely on their use of devices or embedded systems running Linux on Qualcomm SC8180x platforms. This SoC is commonly found in certain mobile devices, IoT devices, and embedded systems. Organizations relying on such hardware for critical operations—such as telecommunications infrastructure, industrial control systems, or mobile device fleets—may experience system hangs leading to operational disruptions. The denial of service caused by the platform hang could result in downtime, loss of productivity, and potential data loss if systems become unresponsive during critical operations. While this vulnerability does not directly expose data or allow remote code execution, the loss of availability can have cascading effects, especially in environments requiring high uptime or real-time responsiveness. Given the specificity of the hardware involved, the threat is more pronounced in sectors utilizing embedded Linux devices with Qualcomm SC8180x chips rather than general IT infrastructure. The absence of known exploits reduces immediate risk, but organizations should remain vigilant and prioritize patching to prevent potential future exploitation.
Mitigation Recommendations
To mitigate CVE-2024-26714, organizations should: 1) Identify all devices and embedded systems running Linux kernels with Qualcomm SC8180x interconnect drivers, particularly those using the affected versions. 2) Apply the official Linux kernel patches that mark the CO0 BCM as a keepalive resource as soon as they become available from trusted sources or vendor updates. 3) For devices where kernel updates are not immediately feasible, consider implementing monitoring solutions to detect system hangs or abnormal log activity indicative of this issue. 4) Engage with hardware and device vendors to confirm patch availability and deployment timelines. 5) In critical environments, plan for controlled reboots or failover mechanisms to minimize downtime if a hang occurs. 6) Maintain an inventory of embedded Linux devices and their kernel versions to facilitate rapid response to similar vulnerabilities in the future. These steps go beyond generic advice by focusing on the specific hardware-software combination and operational context of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2024-26714: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive The CO0 BCM needs to be up at all times, otherwise some hardware (like the UFS controller) loses its connection to the rest of the SoC, resulting in a hang of the platform, accompanied by a spectacular logspam. Mark it as keepalive to prevent such cases.
AI-Powered Analysis
Technical Analysis
CVE-2024-26714 is a vulnerability identified in the Linux kernel specifically related to the interconnect driver for Qualcomm's SC8180x platform. The issue concerns the CO0 BCM (Bus Clock Manager) component, which is critical for maintaining the operational state of certain hardware elements, notably the UFS (Universal Flash Storage) controller. The vulnerability arises because the CO0 BCM was not marked as a keepalive resource, meaning it could be powered down or become inactive under certain conditions. When this happens, the UFS controller loses its connection to the rest of the System on Chip (SoC), causing the entire platform to hang and generating extensive log spam. This results in a denial of service condition due to the system becoming unresponsive. The fix involves marking the CO0 BCM as a keepalive resource to ensure it remains active continuously, preventing the UFS controller from losing connectivity and thus avoiding system hangs. This vulnerability is specific to the Linux kernel versions incorporating the affected Qualcomm SC8180x interconnect driver code. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability primarily impacts embedded or mobile devices using this specific SoC and Linux kernel combination, rather than general-purpose Linux distributions on desktops or servers.
Potential Impact
For European organizations, the impact of CVE-2024-26714 depends largely on their use of devices or embedded systems running Linux on Qualcomm SC8180x platforms. This SoC is commonly found in certain mobile devices, IoT devices, and embedded systems. Organizations relying on such hardware for critical operations—such as telecommunications infrastructure, industrial control systems, or mobile device fleets—may experience system hangs leading to operational disruptions. The denial of service caused by the platform hang could result in downtime, loss of productivity, and potential data loss if systems become unresponsive during critical operations. While this vulnerability does not directly expose data or allow remote code execution, the loss of availability can have cascading effects, especially in environments requiring high uptime or real-time responsiveness. Given the specificity of the hardware involved, the threat is more pronounced in sectors utilizing embedded Linux devices with Qualcomm SC8180x chips rather than general IT infrastructure. The absence of known exploits reduces immediate risk, but organizations should remain vigilant and prioritize patching to prevent potential future exploitation.
Mitigation Recommendations
To mitigate CVE-2024-26714, organizations should: 1) Identify all devices and embedded systems running Linux kernels with Qualcomm SC8180x interconnect drivers, particularly those using the affected versions. 2) Apply the official Linux kernel patches that mark the CO0 BCM as a keepalive resource as soon as they become available from trusted sources or vendor updates. 3) For devices where kernel updates are not immediately feasible, consider implementing monitoring solutions to detect system hangs or abnormal log activity indicative of this issue. 4) Engage with hardware and device vendors to confirm patch availability and deployment timelines. 5) In critical environments, plan for controlled reboots or failover mechanisms to minimize downtime if a hang occurs. 6) Maintain an inventory of embedded Linux devices and their kernel versions to facilitate rapid response to similar vulnerabilities in the future. These steps go beyond generic advice by focusing on the specific hardware-software combination and operational context of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.160Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe38f0
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 5:42:08 PM
Last updated: 7/28/2025, 10:51:43 AM
Views: 10
Related Threats
CVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
UnknownCVE-2025-50861: n/a
UnknownCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighCVE-2025-8946: SQL Injection in projectworlds Online Notes Sharing Platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.