Skip to main content

CVE-2024-26879: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26879cvecve-2024-26879
Published: Wed Apr 17 2024 (04/17/2024, 10:27:36 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: clk: meson: Add missing clocks to axg_clk_regmaps Some clocks were missing from axg_clk_regmaps, which caused kernel panic during cat /sys/kernel/debug/clk/clk_summary [ 57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc ... [ 57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 57.436900] pc : regmap_read+0x1c/0x88 [ 57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0 [ 57.445611] sp : ffff800082f1b690 [ 57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70 [ 57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000 [ 57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000 [ 57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff [ 57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000 [ 57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100 [ 57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24 [ 57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710 [ 57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000 [ 57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000 [ 57.519615] Call trace: [ 57.522030] regmap_read+0x1c/0x88 [ 57.525393] clk_regmap_gate_is_enabled+0x3c/0xb0 [ 57.530050] clk_core_is_enabled+0x44/0x120 [ 57.534190] clk_summary_show_subtree+0x154/0x2f0 [ 57.538847] clk_summary_show_subtree+0x220/0x2f0 [ 57.543505] clk_summary_show_subtree+0x220/0x2f0 [ 57.548162] clk_summary_show_subtree+0x220/0x2f0 [ 57.552820] clk_summary_show_subtree+0x220/0x2f0 [ 57.557477] clk_summary_show_subtree+0x220/0x2f0 [ 57.562135] clk_summary_show_subtree+0x220/0x2f0 [ 57.566792] clk_summary_show_subtree+0x220/0x2f0 [ 57.571450] clk_summary_show+0x84/0xb8 [ 57.575245] seq_read_iter+0x1bc/0x4b8 [ 57.578954] seq_read+0x8c/0xd0 [ 57.582059] full_proxy_read+0x68/0xc8 [ 57.585767] vfs_read+0xb0/0x268 [ 57.588959] ksys_read+0x70/0x108 [ 57.592236] __arm64_sys_read+0x24/0x38 [ 57.596031] invoke_syscall+0x50/0x128 [ 57.599740] el0_svc_common.constprop.0+0x48/0xf8 [ 57.604397] do_el0_svc+0x28/0x40 [ 57.607675] el0_svc+0x34/0xb8 [ 57.610694] el0t_64_sync_handler+0x13c/0x158 [ 57.615006] el0t_64_sync+0x190/0x198 [ 57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00) [ 57.624668] ---[ end trace 0000000000000000 ]--- [jbrunet: add missing Fixes tag]

AI-Powered Analysis

AILast updated: 06/29/2025, 19:42:54 UTC

Technical Analysis

CVE-2024-26879 is a vulnerability identified in the Linux kernel related to the clock management subsystem, specifically within the Meson platform's clock register maps (axg_clk_regmaps). The issue arises from missing clock entries in the axg_clk_regmaps, which leads to a NULL pointer dereference when the kernel attempts to access these clocks. This dereference occurs during the execution of the command 'cat /sys/kernel/debug/clk/clk_summary', which is used to display clock information for debugging purposes. The kernel panic trace indicates that the fault happens in the regmap_read function, called by clk_regmap_gate_is_enabled, which is part of the clock core's enablement checking routines. The absence of certain clocks in the register map causes the kernel to attempt to read from a NULL pointer, resulting in a system crash (kernel panic). This vulnerability affects specific versions of the Linux kernel identified by the commit hash 14ebb3154b8f3d562cb18331b08ff1a22609ae59. The vulnerability does not appear to have known exploits in the wild at this time, and no CVSS score has been assigned. The root cause is a missing initialization or registration of clocks in the Meson platform's clock management code, which is critical for stable kernel operation on affected hardware platforms. The vulnerability is triggered by a local user or process reading the debug clock summary file, which is typically accessible only to privileged users. The fix involves adding the missing clocks to the axg_clk_regmaps to prevent the NULL pointer dereference and subsequent kernel panic.

Potential Impact

For European organizations, the impact of CVE-2024-26879 depends largely on the deployment of affected Linux kernel versions on their infrastructure, particularly on devices using the Meson platform (commonly found in embedded systems and certain ARM-based devices). The vulnerability causes a kernel panic, leading to a denial of service (DoS) condition. This can disrupt critical services, especially in environments relying on embedded Linux devices for networking, industrial control, or IoT applications. While the vulnerability requires local access to trigger (reading a debug file), it could be exploited by an attacker who has gained limited access to a system to cause system instability or downtime. This may affect operational continuity, particularly in sectors such as manufacturing, telecommunications, and critical infrastructure where embedded Linux devices are prevalent. The lack of remote exploitability reduces the risk of widespread attacks but does not eliminate the threat from insider threats or lateral movement within networks. Additionally, kernel panics can lead to data loss or corruption if systems are not properly configured for graceful recovery. Organizations using Linux distributions that incorporate the affected kernel versions must prioritize patching to maintain system stability and security.

Mitigation Recommendations

1. Immediate application of kernel patches or updates from Linux distributions that address CVE-2024-26879 is the primary mitigation step. Monitor vendor advisories for updated kernels that include the fix for missing clocks in axg_clk_regmaps. 2. Restrict access to /sys/kernel/debug/clk/clk_summary and other debug interfaces to trusted administrators only, minimizing the risk of accidental or malicious triggering of the vulnerability. 3. Implement strict access controls and monitoring on systems running affected kernels, especially embedded devices using the Meson platform, to detect unusual read operations or attempts to access debug files. 4. For embedded and IoT devices, ensure secure firmware update mechanisms are in place to facilitate timely patch deployment. 5. Conduct thorough inventory and asset management to identify devices running the affected kernel versions and prioritize remediation efforts accordingly. 6. Employ kernel crash dump analysis and monitoring tools to quickly detect and respond to kernel panics that may indicate exploitation attempts. 7. Where possible, isolate critical embedded devices from general network access to reduce the attack surface and limit potential exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.185Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e38

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:42:54 PM

Last updated: 7/27/2025, 1:38:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats