Skip to main content

CVE-2024-26866: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26866cvecve-2024-26866
Published: Wed Apr 17 2024 (04/17/2024, 10:27:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: spi: lpspi: Avoid potential use-after-free in probe() fsl_lpspi_probe() is allocating/disposing memory manually with spi_alloc_host()/spi_alloc_target(), but uses devm_spi_register_controller(). In case of error after the latter call the memory will be explicitly freed in the probe function by spi_controller_put() call, but used afterwards by "devm" management outside probe() (spi_unregister_controller() <- devm_spi_unregister() below). Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 ... Call trace: kernfs_find_ns kernfs_find_and_get_ns sysfs_remove_group sysfs_remove_groups device_remove_attrs device_del spi_unregister_controller devm_spi_unregister release_nodes devres_release_all really_probe driver_probe_device __device_attach_driver bus_for_each_drv __device_attach device_initial_probe bus_probe_device deferred_probe_work_func process_one_work worker_thread kthread ret_from_fork

AI-Powered Analysis

AILast updated: 06/29/2025, 19:40:10 UTC

Technical Analysis

CVE-2024-26866 is a vulnerability identified in the Linux kernel, specifically within the SPI (Serial Peripheral Interface) subsystem's lpspi driver. The issue arises in the probe function of the fsl_lpspi driver, where manual memory allocation and deallocation are performed using spi_alloc_host() and spi_alloc_target(), followed by a call to devm_spi_register_controller(). The vulnerability is due to a use-after-free condition: if an error occurs after devm_spi_register_controller() is called, the allocated memory is explicitly freed within the probe function by spi_controller_put(), but the device management (devm) framework still attempts to use this freed memory later during cleanup via spi_unregister_controller() and devm_spi_unregister(). This leads to a kernel NULL pointer dereference at a low virtual address (0x70), causing a kernel panic or crash. The call trace indicates the fault occurs during device removal and cleanup routines, involving sysfs and device attribute management. This vulnerability can lead to denial of service (DoS) by crashing the kernel or potentially enable escalation of privileges or arbitrary code execution if exploited in a more complex attack chain. The vulnerability affects Linux kernel versions identified by the commit hashes provided, and it was publicly disclosed on April 17, 2024. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the vulnerable lpspi driver enabled. The SPI subsystem is commonly used in embedded systems, industrial control devices, IoT devices, and specialized hardware interfaces. Organizations relying on Linux-based embedded platforms in manufacturing, telecommunications, automotive, or critical infrastructure sectors could face service disruptions due to kernel crashes triggered by this vulnerability. A successful exploitation could lead to denial of service, impacting availability of critical systems. Although no known exploits exist yet, the potential for kernel crashes or privilege escalation could be leveraged by attackers to disrupt operations or gain unauthorized access. This is particularly concerning for sectors with stringent uptime and security requirements, such as energy, transportation, and healthcare. The vulnerability's impact on confidentiality and integrity is less direct but cannot be ruled out if combined with other vulnerabilities or attack vectors.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched. Since the issue is in the kernel's SPI driver, kernel upgrades from trusted sources or vendor-provided patches should be applied promptly. For embedded and IoT devices where kernel updates are challenging, organizations should assess the necessity of the lpspi driver and disable or blacklist it if not required. Implement strict access controls and monitoring on devices using SPI interfaces to detect abnormal behavior or crashes. Employ kernel crash dump analysis to identify attempts to exploit this vulnerability. Additionally, organizations should maintain robust backup and recovery procedures to minimize downtime from potential denial of service incidents. Network segmentation and limiting access to vulnerable devices can reduce the attack surface. Finally, coordinate with hardware and software vendors to ensure timely patch deployment and verify that custom or legacy systems are not overlooked.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.184Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3dec

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:40:10 PM

Last updated: 7/26/2025, 2:46:08 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats