Skip to main content

CVE-2024-50239: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50239cvecve-2024-50239
Published: Sat Nov 09 2024 (11/09/2024, 10:14:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation") removed most users of the platform device driver data from the qcom-qmp-usb driver, but mistakenly also removed the initialisation despite the data still being used in the runtime PM callbacks. This bug was later reproduced when the driver was copied to create the qmp-usb-legacy driver. Restore the driver data initialisation at probe to avoid a NULL-pointer dereference on runtime suspend. Apparently no one uses runtime PM, which currently needs to be enabled manually through sysfs, with these drivers.

AI-Powered Analysis

AILast updated: 06/28/2025, 13:24:50 UTC

Technical Analysis

CVE-2024-50239 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm QMP USB legacy driver (qmp-usb-legacy). The root cause stems from a NULL pointer dereference triggered during the runtime suspend operation of the driver. The issue originated when a commit (413db06c05e7) intended to clean up the probe initialization in the qcom-qmp-usb driver inadvertently removed the initialization of platform device driver data. Although most usages of this data were removed, the runtime power management (PM) callbacks still relied on it. This omission led to a NULL pointer dereference when runtime suspend was invoked. The problem was later replicated in the qmp-usb-legacy driver, which was derived from the original qcom-qmp-usb driver. The fix involved restoring the driver data initialization during the probe phase to prevent the NULL dereference. Notably, runtime PM with these drivers is not enabled by default and requires manual activation via sysfs, which limits the exposure of this vulnerability under typical configurations. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by the commit hash e464a3180a43b6596bd267f9f274e1793bfb8150, indicating a narrow window of affected builds.

Potential Impact

For European organizations, the impact of CVE-2024-50239 is currently limited due to the requirement that runtime power management must be manually enabled for the affected Qualcomm USB legacy driver. Organizations using Linux systems with Qualcomm QMP USB legacy drivers that have runtime PM enabled could experience system instability or crashes caused by the NULL pointer dereference during runtime suspend operations. This could lead to denial of service (DoS) conditions on affected devices, potentially disrupting critical systems that rely on these drivers, such as embedded systems, IoT devices, or specialized hardware running Linux kernels with Qualcomm USB components. However, since runtime PM is not enabled by default and the affected driver is relatively specialized, widespread impact across general enterprise Linux deployments is unlikely. The vulnerability does not appear to allow privilege escalation or remote code execution, limiting the scope to availability concerns. Nevertheless, organizations with embedded Linux devices or telecom infrastructure using Qualcomm hardware should assess their exposure carefully.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running Qualcomm QMP USB legacy drivers, particularly those with runtime power management enabled. 2) Apply the official Linux kernel patch that restores the driver data initialization during the probe phase as soon as it becomes available in their kernel distribution or vendor updates. 3) If runtime PM is not required, ensure it remains disabled to reduce exposure. 4) For embedded or specialized devices, coordinate with hardware vendors or system integrators to obtain patched firmware or kernel versions. 5) Monitor sysfs settings related to runtime PM to detect unauthorized enabling of this feature. 6) Implement robust system monitoring to detect crashes or abnormal suspend/resume behavior that could indicate exploitation attempts. 7) Maintain up-to-date inventories of kernel versions and drivers in use to facilitate rapid response to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.976Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdf5fb

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 1:24:50 PM

Last updated: 7/31/2025, 12:34:08 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats