CVE-2024-50239: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation") removed most users of the platform device driver data from the qcom-qmp-usb driver, but mistakenly also removed the initialisation despite the data still being used in the runtime PM callbacks. This bug was later reproduced when the driver was copied to create the qmp-usb-legacy driver. Restore the driver data initialisation at probe to avoid a NULL-pointer dereference on runtime suspend. Apparently no one uses runtime PM, which currently needs to be enabled manually through sysfs, with these drivers.
AI Analysis
Technical Summary
CVE-2024-50239 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm QMP USB legacy driver (qmp-usb-legacy). The root cause stems from a NULL pointer dereference triggered during the runtime suspend operation of the driver. The issue originated when a commit (413db06c05e7) intended to clean up the probe initialization in the qcom-qmp-usb driver inadvertently removed the initialization of platform device driver data. Although most usages of this data were removed, the runtime power management (PM) callbacks still relied on it. This omission led to a NULL pointer dereference when runtime suspend was invoked. The problem was later replicated in the qmp-usb-legacy driver, which was derived from the original qcom-qmp-usb driver. The fix involved restoring the driver data initialization during the probe phase to prevent the NULL dereference. Notably, runtime PM with these drivers is not enabled by default and requires manual activation via sysfs, which limits the exposure of this vulnerability under typical configurations. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by the commit hash e464a3180a43b6596bd267f9f274e1793bfb8150, indicating a narrow window of affected builds.
Potential Impact
For European organizations, the impact of CVE-2024-50239 is currently limited due to the requirement that runtime power management must be manually enabled for the affected Qualcomm USB legacy driver. Organizations using Linux systems with Qualcomm QMP USB legacy drivers that have runtime PM enabled could experience system instability or crashes caused by the NULL pointer dereference during runtime suspend operations. This could lead to denial of service (DoS) conditions on affected devices, potentially disrupting critical systems that rely on these drivers, such as embedded systems, IoT devices, or specialized hardware running Linux kernels with Qualcomm USB components. However, since runtime PM is not enabled by default and the affected driver is relatively specialized, widespread impact across general enterprise Linux deployments is unlikely. The vulnerability does not appear to allow privilege escalation or remote code execution, limiting the scope to availability concerns. Nevertheless, organizations with embedded Linux devices or telecom infrastructure using Qualcomm hardware should assess their exposure carefully.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running Qualcomm QMP USB legacy drivers, particularly those with runtime power management enabled. 2) Apply the official Linux kernel patch that restores the driver data initialization during the probe phase as soon as it becomes available in their kernel distribution or vendor updates. 3) If runtime PM is not required, ensure it remains disabled to reduce exposure. 4) For embedded or specialized devices, coordinate with hardware vendors or system integrators to obtain patched firmware or kernel versions. 5) Monitor sysfs settings related to runtime PM to detect unauthorized enabling of this feature. 6) Implement robust system monitoring to detect crashes or abnormal suspend/resume behavior that could indicate exploitation attempts. 7) Maintain up-to-date inventories of kernel versions and drivers in use to facilitate rapid response to similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-50239: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation") removed most users of the platform device driver data from the qcom-qmp-usb driver, but mistakenly also removed the initialisation despite the data still being used in the runtime PM callbacks. This bug was later reproduced when the driver was copied to create the qmp-usb-legacy driver. Restore the driver data initialisation at probe to avoid a NULL-pointer dereference on runtime suspend. Apparently no one uses runtime PM, which currently needs to be enabled manually through sysfs, with these drivers.
AI-Powered Analysis
Technical Analysis
CVE-2024-50239 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm QMP USB legacy driver (qmp-usb-legacy). The root cause stems from a NULL pointer dereference triggered during the runtime suspend operation of the driver. The issue originated when a commit (413db06c05e7) intended to clean up the probe initialization in the qcom-qmp-usb driver inadvertently removed the initialization of platform device driver data. Although most usages of this data were removed, the runtime power management (PM) callbacks still relied on it. This omission led to a NULL pointer dereference when runtime suspend was invoked. The problem was later replicated in the qmp-usb-legacy driver, which was derived from the original qcom-qmp-usb driver. The fix involved restoring the driver data initialization during the probe phase to prevent the NULL dereference. Notably, runtime PM with these drivers is not enabled by default and requires manual activation via sysfs, which limits the exposure of this vulnerability under typical configurations. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by the commit hash e464a3180a43b6596bd267f9f274e1793bfb8150, indicating a narrow window of affected builds.
Potential Impact
For European organizations, the impact of CVE-2024-50239 is currently limited due to the requirement that runtime power management must be manually enabled for the affected Qualcomm USB legacy driver. Organizations using Linux systems with Qualcomm QMP USB legacy drivers that have runtime PM enabled could experience system instability or crashes caused by the NULL pointer dereference during runtime suspend operations. This could lead to denial of service (DoS) conditions on affected devices, potentially disrupting critical systems that rely on these drivers, such as embedded systems, IoT devices, or specialized hardware running Linux kernels with Qualcomm USB components. However, since runtime PM is not enabled by default and the affected driver is relatively specialized, widespread impact across general enterprise Linux deployments is unlikely. The vulnerability does not appear to allow privilege escalation or remote code execution, limiting the scope to availability concerns. Nevertheless, organizations with embedded Linux devices or telecom infrastructure using Qualcomm hardware should assess their exposure carefully.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running Qualcomm QMP USB legacy drivers, particularly those with runtime power management enabled. 2) Apply the official Linux kernel patch that restores the driver data initialization during the probe phase as soon as it becomes available in their kernel distribution or vendor updates. 3) If runtime PM is not required, ensure it remains disabled to reduce exposure. 4) For embedded or specialized devices, coordinate with hardware vendors or system integrators to obtain patched firmware or kernel versions. 5) Monitor sysfs settings related to runtime PM to detect unauthorized enabling of this feature. 6) Implement robust system monitoring to detect crashes or abnormal suspend/resume behavior that could indicate exploitation attempts. 7) Maintain up-to-date inventories of kernel versions and drivers in use to facilitate rapid response to similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.976Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdf5fb
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 1:24:50 PM
Last updated: 7/31/2025, 12:34:08 PM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.