CVE-2024-50075: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: xhci: tegra: fix checked USB2 port number If USB virtualizatoin is enabled, USB2 ports are shared between all Virtual Functions. The USB2 port number owned by an USB2 root hub in a Virtual Function may be less than total USB2 phy number supported by the Tegra XUSB controller. Using total USB2 phy number as port number to check all PORTSC values would cause invalid memory access. [ 116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f ... [ 117.213640] Call trace: [ 117.216783] tegra_xusb_enter_elpg+0x23c/0x658 [ 117.222021] tegra_xusb_runtime_suspend+0x40/0x68 [ 117.227260] pm_generic_runtime_suspend+0x30/0x50 [ 117.232847] __rpm_callback+0x84/0x3c0 [ 117.237038] rpm_suspend+0x2dc/0x740 [ 117.241229] pm_runtime_work+0xa0/0xb8 [ 117.245769] process_scheduled_works+0x24c/0x478 [ 117.251007] worker_thread+0x23c/0x328 [ 117.255547] kthread+0x104/0x1b0 [ 117.259389] ret_from_fork+0x10/0x20 [ 117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)
AI Analysis
Technical Summary
CVE-2024-50075 is a vulnerability identified in the Linux kernel specifically affecting the Tegra XUSB controller's handling of USB2 port numbers when USB virtualization is enabled. The Tegra XUSB controller supports multiple USB2 physical ports (phys), and in virtualized environments, these ports are shared among all Virtual Functions (VFs). The vulnerability arises because the USB2 port number assigned to a USB2 root hub within a Virtual Function may be less than the total number of USB2 phys supported by the controller. However, the kernel code incorrectly uses the total number of USB2 phys as the port number to check all PORTSC (Port Status and Control) register values. This leads to out-of-bounds memory access, causing invalid memory reads or writes. The kernel logs indicate a kernel paging request failure at an invalid virtual address, followed by a call trace involving functions such as tegra_xusb_enter_elpg and tegra_xusb_runtime_suspend, which are related to power management and runtime suspend operations of the USB controller. This bug can cause kernel crashes (kernel panics) or instability due to invalid memory access during USB2 port status checks in virtualized environments. The vulnerability is specifically relevant to Linux kernel versions containing the affected commit (hash a30951d31b250bf3479c00e93646b6cc6fb42a56) and impacts systems using the Tegra XUSB controller with USB virtualization enabled. No known exploits are reported in the wild as of publication date (October 29, 2024), and no CVSS score has been assigned yet. The issue was reserved and published within a short timeframe, indicating a recent discovery and patching effort.
Potential Impact
For European organizations, the impact of CVE-2024-50075 depends largely on the deployment of Linux systems running on Tegra-based hardware with USB virtualization enabled. Tegra processors are commonly used in embedded systems, automotive infotainment, industrial control, and edge computing devices. Organizations utilizing such devices in critical infrastructure, manufacturing, or automotive sectors could face system instability or denial of service due to kernel crashes triggered by this vulnerability. The invalid memory access could lead to kernel panics, causing downtime or interruption of services relying on affected hardware. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could be significant in environments where uptime is critical. Additionally, since the issue occurs during runtime suspend and power management operations, it could affect power efficiency and device reliability. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation. European organizations with embedded Linux devices in sectors such as automotive manufacturing, industrial automation, telecommunications, and IoT deployments should prioritize assessment and remediation to avoid operational disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the USB2 port number checking logic in the Tegra XUSB driver as soon as it becomes available from trusted Linux kernel sources or vendor distributions. 2. For organizations using Tegra-based embedded systems, coordinate with hardware vendors and device manufacturers to obtain firmware or kernel updates incorporating the fix. 3. If patching is not immediately possible, consider disabling USB virtualization features on affected devices to prevent the vulnerability from being triggered, understanding this may reduce functionality. 4. Implement monitoring for kernel logs and system stability indicators to detect early signs of kernel panics or memory access errors related to USB operations. 5. Conduct thorough testing of updated kernels in staging environments before deployment to avoid regressions in power management or USB functionality. 6. Maintain an inventory of devices using Tegra XUSB controllers and USB virtualization to prioritize patching efforts. 7. Engage with Linux distribution security teams and subscribe to security advisories to receive timely updates on this and related vulnerabilities. 8. For critical infrastructure, consider network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks or users.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2024-50075: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: xhci: tegra: fix checked USB2 port number If USB virtualizatoin is enabled, USB2 ports are shared between all Virtual Functions. The USB2 port number owned by an USB2 root hub in a Virtual Function may be less than total USB2 phy number supported by the Tegra XUSB controller. Using total USB2 phy number as port number to check all PORTSC values would cause invalid memory access. [ 116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f ... [ 117.213640] Call trace: [ 117.216783] tegra_xusb_enter_elpg+0x23c/0x658 [ 117.222021] tegra_xusb_runtime_suspend+0x40/0x68 [ 117.227260] pm_generic_runtime_suspend+0x30/0x50 [ 117.232847] __rpm_callback+0x84/0x3c0 [ 117.237038] rpm_suspend+0x2dc/0x740 [ 117.241229] pm_runtime_work+0xa0/0xb8 [ 117.245769] process_scheduled_works+0x24c/0x478 [ 117.251007] worker_thread+0x23c/0x328 [ 117.255547] kthread+0x104/0x1b0 [ 117.259389] ret_from_fork+0x10/0x20 [ 117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)
AI-Powered Analysis
Technical Analysis
CVE-2024-50075 is a vulnerability identified in the Linux kernel specifically affecting the Tegra XUSB controller's handling of USB2 port numbers when USB virtualization is enabled. The Tegra XUSB controller supports multiple USB2 physical ports (phys), and in virtualized environments, these ports are shared among all Virtual Functions (VFs). The vulnerability arises because the USB2 port number assigned to a USB2 root hub within a Virtual Function may be less than the total number of USB2 phys supported by the controller. However, the kernel code incorrectly uses the total number of USB2 phys as the port number to check all PORTSC (Port Status and Control) register values. This leads to out-of-bounds memory access, causing invalid memory reads or writes. The kernel logs indicate a kernel paging request failure at an invalid virtual address, followed by a call trace involving functions such as tegra_xusb_enter_elpg and tegra_xusb_runtime_suspend, which are related to power management and runtime suspend operations of the USB controller. This bug can cause kernel crashes (kernel panics) or instability due to invalid memory access during USB2 port status checks in virtualized environments. The vulnerability is specifically relevant to Linux kernel versions containing the affected commit (hash a30951d31b250bf3479c00e93646b6cc6fb42a56) and impacts systems using the Tegra XUSB controller with USB virtualization enabled. No known exploits are reported in the wild as of publication date (October 29, 2024), and no CVSS score has been assigned yet. The issue was reserved and published within a short timeframe, indicating a recent discovery and patching effort.
Potential Impact
For European organizations, the impact of CVE-2024-50075 depends largely on the deployment of Linux systems running on Tegra-based hardware with USB virtualization enabled. Tegra processors are commonly used in embedded systems, automotive infotainment, industrial control, and edge computing devices. Organizations utilizing such devices in critical infrastructure, manufacturing, or automotive sectors could face system instability or denial of service due to kernel crashes triggered by this vulnerability. The invalid memory access could lead to kernel panics, causing downtime or interruption of services relying on affected hardware. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact could be significant in environments where uptime is critical. Additionally, since the issue occurs during runtime suspend and power management operations, it could affect power efficiency and device reliability. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation. European organizations with embedded Linux devices in sectors such as automotive manufacturing, industrial automation, telecommunications, and IoT deployments should prioritize assessment and remediation to avoid operational disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the USB2 port number checking logic in the Tegra XUSB driver as soon as it becomes available from trusted Linux kernel sources or vendor distributions. 2. For organizations using Tegra-based embedded systems, coordinate with hardware vendors and device manufacturers to obtain firmware or kernel updates incorporating the fix. 3. If patching is not immediately possible, consider disabling USB virtualization features on affected devices to prevent the vulnerability from being triggered, understanding this may reduce functionality. 4. Implement monitoring for kernel logs and system stability indicators to detect early signs of kernel panics or memory access errors related to USB operations. 5. Conduct thorough testing of updated kernels in staging environments before deployment to avoid regressions in power management or USB functionality. 6. Maintain an inventory of devices using Tegra XUSB controllers and USB virtualization to prioritize patching efforts. 7. Engage with Linux distribution security teams and subscribe to security advisories to receive timely updates on this and related vulnerabilities. 8. For critical infrastructure, consider network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks or users.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.940Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfe8c
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 4:56:47 PM
Last updated: 8/6/2025, 9:53:00 PM
Views: 15
Related Threats
CVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumCVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.