Skip to main content

CVE-2024-26717: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26717cvecve-2024-26717
Published: Wed Apr 03 2024 (04/03/2024, 14:55:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid-of: fix NULL-deref on failed power up A while back the I2C HID implementation was split in an ACPI and OF part, but the new OF driver never initialises the client pointer which is dereferenced on power-up failures.

AI-Powered Analysis

AILast updated: 06/29/2025, 17:42:35 UTC

Technical Analysis

CVE-2024-26717 is a vulnerability identified in the Linux kernel's I2C HID (Human Interface Device) subsystem, specifically within the i2c-hid-of driver component. The vulnerability arises from a NULL pointer dereference during the power-up sequence of the device. The root cause is that the i2c-hid-of driver, which was split from the ACPI implementation, fails to initialize the client pointer properly. When a power-up failure occurs, the driver attempts to dereference this uninitialized pointer, leading to a NULL pointer dereference. This type of flaw can cause the kernel to crash or panic, resulting in a denial of service (DoS) condition. The issue affects certain versions of the Linux kernel identified by the commit hash b33752c300232d7f95dd9a4353947d0c9e6a0e52. The vulnerability was reserved in February 2024 and published in April 2024, with no known exploits in the wild at the time of reporting. The lack of a CVSS score indicates that the severity has not been formally assessed, but the technical nature suggests a stability and availability impact rather than direct confidentiality or integrity compromise. The vulnerability is specific to the i2c-hid-of driver, which is used for interfacing with I2C HID devices typically found in embedded systems, laptops, and other hardware that rely on I2C for human interface peripherals such as touchpads or keyboards. Exploitation would likely require local access or crafted hardware interactions to trigger the power-up failure condition that leads to the NULL dereference.

Potential Impact

For European organizations, the primary impact of CVE-2024-26717 is the potential for denial of service on Linux systems that utilize the affected i2c-hid-of driver. This could manifest as system crashes or kernel panics when the vulnerable driver attempts to power up an I2C HID device and encounters the NULL pointer dereference. Organizations relying on Linux-based infrastructure, particularly those using hardware with I2C HID peripherals (such as laptops, embedded devices, or specialized industrial equipment), may experience unexpected system instability or downtime. While this vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting system outages could disrupt business operations, especially in environments where high availability is critical. Additionally, systems used in industrial control, healthcare, or critical infrastructure sectors that employ Linux with these drivers could face operational risks. Given the absence of known exploits in the wild, the immediate threat level is moderate, but the vulnerability should be addressed promptly to prevent potential exploitation or accidental triggering.

Mitigation Recommendations

To mitigate CVE-2024-26717, European organizations should: 1) Apply the official Linux kernel patches that fix the NULL pointer initialization issue in the i2c-hid-of driver as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Identify and inventory systems running affected Linux kernel versions, focusing on those with I2C HID hardware components, to prioritize patch deployment. 3) Implement kernel live patching solutions where possible to minimize downtime during remediation. 4) Monitor system logs and kernel messages for signs of power-up failures or kernel panics related to the i2c-hid-of driver to detect potential exploitation attempts or accidental triggers. 5) Restrict local access to critical Linux systems to reduce the risk of an attacker triggering the vulnerability. 6) For embedded or specialized devices that cannot be easily patched, consider hardware or firmware updates from vendors or implement compensating controls such as system watchdogs to automatically recover from crashes. 7) Maintain up-to-date backups and incident response plans to quickly restore affected systems in case of denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.161Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3907

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 5:42:35 PM

Last updated: 7/26/2025, 2:24:25 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats