๐Ÿ” CVE Alert

CVE-2024-50269

HIGH 7.8

usb: musb: sunxi: Fix accessing an released usb phy

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed after released. 1) register platform driver @sunxi_musb_driver // get the usb phy @glue->xceiv sunxi_musb_probe() -> devm_usb_get_phy(). 2) register and unregister platform driver @musb_driver musb_probe() -> sunxi_musb_init() use the phy here //the phy is released here musb_remove() -> sunxi_musb_exit() -> devm_usb_put_phy() 3) register @musb_driver again musb_probe() -> sunxi_musb_init() use the phy here but the phy has been released at 2). ... Fixed by reverting the commit, namely, removing devm_usb_put_phy() from sunxi_musb_exit().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 19, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 721ddad945596220c123eb6f7126729fe277ee4f 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 4aa77d5ea9944468e16c3eed15e858fd5de44de1 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 6e2848d1c8c0139161e69ac0a94133e90e9988e8 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 63559ba8077cbadae1c92a65b73ea522bf377dd9 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < ccd811c304d2ee56189bfbc49302cb3c44361893 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 8a30da5aa9609663b3e05bcc91a916537f66a4cd 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < b08baa75b989cf779cbfa0969681f8ba2dc46569 6ed05c68cbcae42cd52b8e53b66952bfa9c002ce < 498dbd9aea205db9da674994b74c7bf8e18448bd 583a4219841d00e96b5de55be160aa7eb7721a4d b4ecc15d6f5a13c0bbe2777438e87e321f83faaa a2259ebaa933331c53904caf792b619ec42f0da5
Linux / Linux
4.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/721ddad945596220c123eb6f7126729fe277ee4f git.kernel.org: https://git.kernel.org/stable/c/4aa77d5ea9944468e16c3eed15e858fd5de44de1 git.kernel.org: https://git.kernel.org/stable/c/6e2848d1c8c0139161e69ac0a94133e90e9988e8 git.kernel.org: https://git.kernel.org/stable/c/63559ba8077cbadae1c92a65b73ea522bf377dd9 git.kernel.org: https://git.kernel.org/stable/c/ccd811c304d2ee56189bfbc49302cb3c44361893 git.kernel.org: https://git.kernel.org/stable/c/8a30da5aa9609663b3e05bcc91a916537f66a4cd git.kernel.org: https://git.kernel.org/stable/c/b08baa75b989cf779cbfa0969681f8ba2dc46569 git.kernel.org: https://git.kernel.org/stable/c/498dbd9aea205db9da674994b74c7bf8e18448bd lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html