Skip to main content

CVE-2024-50057: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50057cvecve-2024-50057
Published: Mon Oct 21 2024 (10/21/2024, 19:39:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before In polling mode, if no IRQ was requested there is no need to free it. Call devm_free_irq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal: WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c ... ... Call trace: devm_free_irq+0x80/0x8c tps6598x_remove+0x28/0x88 [tps6598x] i2c_device_remove+0x2c/0x9c device_remove+0x4c/0x80 device_release_driver_internal+0x1cc/0x228 driver_detach+0x50/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 i2c_del_driver+0x54/0x64 tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x] __arm64_sys_delete_module+0x184/0x264 invoke_syscall+0x48/0x110 el0_svc_common.constprop.0+0xc8/0xe8 do_el0_svc+0x20/0x2c el0_svc+0x28/0x98 el0t_64_sync_handler+0x13c/0x158 el0t_64_sync+0x190/0x194

AI-Powered Analysis

AILast updated: 06/28/2025, 16:41:41 UTC

Technical Analysis

CVE-2024-50057 addresses a vulnerability in the Linux kernel's USB Type-C Power Delivery (PD) interface driver, specifically within the tipd (Type-C Interrupt Polling Daemon) component. The issue arises from improper handling of interrupt requests (IRQs) during the removal of the tps6598x driver, which manages a USB Type-C controller chip. The vulnerability is due to the kernel attempting to free an IRQ that was never requested in polling mode, leading to a kernel warning and potentially unstable behavior. The root cause is that devm_free_irq() is called unconditionally during driver removal, without verifying if the IRQ was actually allocated (i.e., client->irq is set). This can cause kernel warnings and may lead to resource mismanagement or undefined kernel states. The patch fixes this by ensuring devm_free_irq() is only called if the IRQ was previously requested, preventing the warning and stabilizing driver removal. The call trace indicates that the issue occurs during the module removal process, involving functions like tps6598x_remove, i2c_device_remove, and device_release_driver_internal. Although no known exploits are reported in the wild, the vulnerability could lead to kernel instability or denial of service if exploited, especially on systems using the affected USB Type-C controllers. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent and targeted fix. No CVSS score is assigned yet, and the vulnerability primarily impacts the kernel's interrupt handling logic in a specific driver context.

Potential Impact

For European organizations, the impact of CVE-2024-50057 depends largely on their deployment of Linux systems utilizing the affected USB Type-C controllers (tps6598x) and kernel versions. Many enterprises, research institutions, and governmental bodies in Europe rely on Linux-based servers, workstations, and embedded devices. If these systems use the affected kernel versions and hardware, they could experience kernel warnings or instability during device driver removal or module unloading, potentially leading to system crashes or denial of service conditions. This could disrupt critical operations, especially in environments where USB Type-C devices are frequently connected or disconnected, such as in development labs, manufacturing, or IoT deployments. Although exploitation requires specific conditions and no active exploits are known, the risk of accidental system instability or targeted attacks exploiting this flaw exists. Additionally, the vulnerability could be leveraged in multi-tenant or shared environments to cause denial of service or escalate issues. The impact on confidentiality and integrity is minimal, as the vulnerability does not directly enable privilege escalation or data leakage, but availability could be affected due to kernel instability.

Mitigation Recommendations

To mitigate CVE-2024-50057, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing this vulnerability as soon as they become available, especially on systems using USB Type-C controllers managed by the tps6598x driver. 2) Audit and inventory Linux systems to identify those running affected kernel versions and hardware, prioritizing critical infrastructure and production environments. 3) Where immediate patching is not feasible, limit the unloading or removal of the tps6598x driver module and avoid frequent connect/disconnect cycles of USB Type-C devices that rely on this driver. 4) Implement kernel crash monitoring and alerting to detect any instability or warnings related to IRQ handling. 5) For embedded or IoT devices, coordinate with hardware vendors to receive firmware or kernel updates addressing this issue. 6) Consider deploying kernel hardening and integrity monitoring tools to detect anomalous behavior related to driver management. 7) Maintain robust backup and recovery procedures to minimize downtime in case of kernel crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.938Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfde8

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:41:41 PM

Last updated: 8/10/2025, 2:14:50 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats