PatchSiren cyber security CVE debrief
CVE-2024-26651 Linux CVE debrief
CVE-2024-26651 is a Linux kernel issue in the sr9800 USB network driver where failure from usbnet_get_endpoints() was not properly checked and propagated. The published fix adds error handling so the driver stops on endpoint setup failure instead of continuing with invalid state. NVD rates the issue as medium severity with local, low-privileged, no-user-interaction conditions and high availability impact.
- Vendor
- Linux
- Product
- CVE-2024-26651
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-03-27
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-03-27
- Advisory updated
- 2026-05-12
Who should care
Linux system maintainers, distro security teams, and operators of systems running affected kernel branches, especially where the sr9800 USB network driver is in use.
Technical summary
The supplied kernel fix is narrowly scoped: it adds a check for usbnet_get_endpoints() and returns the error when endpoint discovery fails. According to the NVD corpus, affected Linux kernel CPE ranges include versions from 3.14 before 4.19.311, 4.20 before 5.4.273, 5.5 before 5.10.214, 5.11 before 5.15.153, 5.16 before 6.1.83, 6.2 before 6.6.23, 6.7 before 6.7.11, and 6.8 before 6.8.2. The CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, and NVD does not assign a specific CWE beyond NVD-CWE-noinfo.
Defensive priority
Medium — prioritize patching on affected Linux kernel branches, especially where the sr9800 driver is present or potentially loadable.
Recommended defensive actions
- Update to a kernel release that includes the sr9800 usbnet_get_endpoints() error-handling fix, or apply the vendor backport for your supported branch.
- Confirm whether affected hosts run one of the vulnerable kernel version ranges listed by NVD.
- Track downstream distro advisories and security errata for backported fixes on Debian, Fedora, and vendor-maintained kernels.
- Include this CVE in routine kernel patch compliance checks, since the fix spans multiple long-term support branches.
Evidence notes
The CVE description explicitly states that sr9800 now checks usbnet_get_endpoints() and returns the error if it fails, which indicates a defensive fix for missing error propagation. The NVD record classifies the issue as local, low-privilege, no-interaction, and availability-only (high). The corpus provides affected-version ranges and multiple stable patch references, but no exploit narrative or detailed root-cause analysis beyond the error-checking change.
Official resources
-
CVE-2024-26651 CVE record
CVE.org
-
CVE-2024-26651 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
Publicly disclosed in the CVE/NVD record on 2024-03-27; NVD last modified the record on 2026-05-12.