First published: Sat Nov 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: phy: qcom: qmp-usbc: fix NULL-deref on runtime suspend Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation") removed most users of the platform device driver data from the qcom-qmp-usb driver, but mistakenly also removed the initialisation despite the data still being used in the runtime PM callbacks. This bug was later reproduced when the driver was copied to create the qmp-usbc driver. Restore the driver data initialisation at probe to avoid a NULL-pointer dereference on runtime suspend. Apparently no one uses runtime PM, which currently needs to be enabled manually through sysfs, with these drivers.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8.2<6.9 | |
Linux Kernel | >=6.9<6.11.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50238 has a medium severity rating due to the potential for a NULL dereference that can occur during runtime suspension.
To fix CVE-2024-50238, update your Linux kernel to at least version 6.12.15-1 or apply the appropriate patches from your distribution.
CVE-2024-50238 affects Linux Kernel versions between 6.8.2 and 6.11.7, as well as various 6.12 release candidates.
CVE-2024-50238 is not classified as easily exploitable, but it can lead to system instability if an attack is successful.
If CVE-2024-50238 is left unpatched, it can result in denial of service due to NULL pointer dereferences during runtime operations.