CVE-2024-26600

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26600
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26600.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26600
Downstream
Related
Published
2024-02-24T14:56:55.674Z
Modified
2025-11-27T02:33:24.286567Z
Summary
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
Details

In the Linux kernel, the following vulnerability has been resolved:

phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Ethernet gadget triggering a wakeup for example:

configfs-gadget.g1 gadget.0: ECM Suspend configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup ... Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute ... PC is at 0x0 LR is at musbgadgetwakeup+0x1d4/0x254 [musbhdrc] ... musbgadgetwakeup [musbhdrc] from usbgadgetwakeup+0x1c/0x3c [udccore] usbgadgetwakeup [udccore] from ethstartxmit+0x3b0/0x3d4 [uether] ethstartxmit [uether] from devhardstartxmit+0x94/0x24c devhardstartxmit from schdirectxmit+0x104/0x2e4 schdirectxmit from _devqueuexmit+0x334/0xd88 _devqueuexmit from arpsolicit+0xf0/0x268 arpsolicit from neighprobe+0x54/0x7c neighprobe from _neigheventsend+0x22c/0x47c _neigheventsend from neighresolveoutput+0x14c/0x1c0 neighresolveoutput from ipfinishoutput2+0x1c8/0x628 ipfinishoutput2 from ipsendskb+0x40/0xd8 ipsendskb from udpsendskb+0x124/0x340 udpsendskb from udpsendmsg+0x780/0x984 udpsendmsg from _syssendto+0xd8/0x158 _syssendto from retfastsyscall+0x0/0x58

Let's fix the issue by checking for sendsrp() and setvbus() before calling them. For USB peripheral only cases these both could be NULL.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2024/26xxx/CVE-2024-26600.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
486218c11e8d1c8f515a3bdd70d62203609d4b6b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
8cc889b9dea0579726be9520fcc766077890b462
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
0430bfcd46657d9116a26cd377f112cbc40826a4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
14ef61594a5a286ae0d493b8acbf9eac46fd04c4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
396e17af6761b3cc9e6e4ca94b4de7f642bfece1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
7104ba0f1958adb250319e68a15eff89ec4fd36d

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.7.0
Fixed
4.19.307
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.269
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.210
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.149
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.78
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.17
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.5