CVE-2024-26600

Source
https://cve.org/CVERecord?id=CVE-2024-26600
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26600.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26600
Downstream
Related
Published
2024-02-24T14:56:55.674Z
Modified
2026-03-13T07:53:36.799028Z
Summary
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
Details

In the Linux kernel, the following vulnerability has been resolved:

phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Ethernet gadget triggering a wakeup for example:

configfs-gadget.g1 gadget.0: ECM Suspend configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup ... Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute ... PC is at 0x0 LR is at musbgadgetwakeup+0x1d4/0x254 [musbhdrc] ... musbgadgetwakeup [musbhdrc] from usbgadgetwakeup+0x1c/0x3c [udccore] usbgadgetwakeup [udccore] from ethstartxmit+0x3b0/0x3d4 [uether] ethstartxmit [uether] from devhardstartxmit+0x94/0x24c devhardstartxmit from schdirectxmit+0x104/0x2e4 schdirectxmit from __devqueuexmit+0x334/0xd88 __devqueuexmit from arpsolicit+0xf0/0x268 arpsolicit from neighprobe+0x54/0x7c neighprobe from __neigheventsend+0x22c/0x47c __neigheventsend from neighresolveoutput+0x14c/0x1c0 neighresolveoutput from ipfinishoutput2+0x1c8/0x628 ipfinishoutput2 from ipsendskb+0x40/0xd8 ipsendskb from udpsendskb+0x124/0x340 udpsendskb from udpsendmsg+0x780/0x984 udpsendmsg from __sys_sendto+0xd8/0x158 _syssendto from retfastsyscall+0x0/0x58

Let's fix the issue by checking for sendsrp() and setvbus() before calling them. For USB peripheral only cases these both could be NULL.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26600.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6
Fixed
486218c11e8d1c8f515a3bdd70d62203609d4b6b
Fixed
8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
Fixed
be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
Fixed
8cc889b9dea0579726be9520fcc766077890b462
Fixed
0430bfcd46657d9116a26cd377f112cbc40826a4
Fixed
14ef61594a5a286ae0d493b8acbf9eac46fd04c4
Fixed
396e17af6761b3cc9e6e4ca94b4de7f642bfece1
Fixed
7104ba0f1958adb250319e68a15eff89ec4fd36d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26600.json"