Skip to main content

CVE-2024-50238: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50238cvecve-2024-50238
Published: Sat Nov 09 2024 (11/09/2024, 10:14:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: phy: qcom: qmp-usbc: fix NULL-deref on runtime suspend Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation") removed most users of the platform device driver data from the qcom-qmp-usb driver, but mistakenly also removed the initialisation despite the data still being used in the runtime PM callbacks. This bug was later reproduced when the driver was copied to create the qmp-usbc driver. Restore the driver data initialisation at probe to avoid a NULL-pointer dereference on runtime suspend. Apparently no one uses runtime PM, which currently needs to be enabled manually through sysfs, with these drivers.

AI-Powered Analysis

AILast updated: 06/27/2025, 22:09:56 UTC

Technical Analysis

CVE-2024-50238 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm QMP USB PHY drivers (qcom-qmp-usb and qmp-usbc). The root cause is a NULL-pointer dereference triggered during the runtime suspend phase of power management. This issue arose because a recent code commit (commit 413db06c05e7) removed the initialization of platform device driver data during the probe phase, mistakenly assuming it was no longer needed. However, this data is still accessed in runtime power management callbacks, leading to a NULL-pointer dereference when runtime suspend is invoked. The qmp-usbc driver, which was created by copying the qcom-qmp-usb driver, inherited this bug. Notably, runtime power management (PM) is not enabled by default for these drivers and must be manually activated via sysfs, which likely explains the absence of widespread exploitation or reports of crashes. The vulnerability could cause kernel crashes or system instability if runtime PM is enabled, potentially leading to denial of service (DoS) conditions. Since this is a kernel-level bug, it affects the core operating system and any dependent applications. The vulnerability has been fixed by restoring the proper initialization of the driver data during the probe phase, preventing the NULL-pointer dereference during runtime suspend. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50238 primarily revolves around system stability and availability. Systems running affected Linux kernel versions with Qualcomm QMP USB PHY drivers that have runtime PM enabled could experience kernel panics or crashes, resulting in denial of service. This could disrupt critical infrastructure, enterprise servers, embedded systems, or IoT devices relying on these drivers. While exploitation requires runtime PM to be manually enabled, organizations that customize power management settings or use advanced power-saving configurations on Qualcomm-based hardware are at risk. The vulnerability does not directly compromise confidentiality or integrity but could indirectly affect availability of services, especially in environments where uptime is critical such as telecommunications, industrial control systems, or cloud infrastructure. Since the vulnerability is in the kernel, recovery may require system reboots and patch deployment, which could impact operational continuity. The lack of known exploits and the requirement for manual runtime PM activation reduce immediate risk, but organizations should remain vigilant and apply patches promptly to avoid potential future exploitation or accidental activation of runtime PM leading to crashes.

Mitigation Recommendations

1. Apply the official Linux kernel patch that restores driver data initialization during the probe phase to eliminate the NULL-pointer dereference. Monitor Linux kernel updates and backport patches if using long-term support kernels. 2. Audit systems to identify if runtime power management is enabled on Qualcomm QMP USB PHY drivers. Disable runtime PM on these drivers if not required, especially in production environments, to prevent triggering the vulnerability. 3. For systems requiring runtime PM, conduct thorough testing in controlled environments after patching to ensure stability. 4. Implement monitoring for kernel crashes or unexpected reboots that could indicate attempts to trigger this vulnerability. 5. Maintain strict configuration management to avoid unintended enabling of runtime PM via sysfs or other interfaces. 6. Engage with hardware vendors and Linux distribution maintainers to confirm that patched kernel versions are available and deployed in a timely manner. 7. For embedded or IoT devices using Qualcomm hardware, coordinate with device manufacturers for firmware and kernel updates addressing this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.976Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcf89

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 10:09:56 PM

Last updated: 8/1/2025, 6:42:41 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats