CVE-2024-27002: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: Do a runtime PM get on controllers during probe mt8183-mfgcfg has a mutual dependency with genpd during the probing stage, which leads to a deadlock in the following call stack: CPU0: genpd_lock --> clk_prepare_lock genpd_power_off_work_fn() genpd_lock() generic_pm_domain::power_off() clk_unprepare() clk_prepare_lock() CPU1: clk_prepare_lock --> genpd_lock clk_register() __clk_core_init() clk_prepare_lock() clk_pm_runtime_get() genpd_lock() Do a runtime PM get at the probe function to make sure clk_register() won't acquire the genpd lock. Instead of only modifying mt8183-mfgcfg, do this on all mediatek clock controller probings because we don't believe this would cause any regression. Verified on MT8183 and MT8192 Chromebooks.
AI Analysis
Technical Summary
CVE-2024-27002 is a vulnerability identified in the Linux kernel affecting the MediaTek clock controller drivers, specifically related to the runtime power management (PM) and device probing sequence. The issue arises from a mutual dependency and locking order inversion between the MediaTek manufacturing configuration driver (mt8183-mfgcfg) and the generic power domain (genpd) subsystem during the device probe phase. This leads to a potential deadlock scenario involving two CPU cores where each core waits on a lock held by the other: CPU0 attempts to acquire the genpd_lock while holding clk_prepare_lock, and CPU1 attempts to acquire clk_prepare_lock while holding genpd_lock. The deadlock occurs because clk_register() indirectly calls clk_pm_runtime_get() which tries to acquire genpd_lock, but the locking order is inconsistent between the two subsystems. The fix involves performing a runtime PM get operation early during the probe function to ensure that clk_register() does not acquire the genpd_lock later, thereby preventing the lock inversion and deadlock. Although the vulnerability was verified on MediaTek MT8183 and MT8192 Chromebooks, the patch was applied broadly to all MediaTek clock controller probings in the Linux kernel to prevent regressions. This vulnerability is a kernel-level concurrency issue that can cause system hangs or freezes during device initialization, impacting system stability and availability. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-27002 is on the stability and availability of Linux-based systems running on affected MediaTek hardware platforms, particularly those using MT8183 and MT8192 SoCs or similar MediaTek clock controllers. This includes Chromebooks and potentially embedded or IoT devices that rely on these chipsets. The deadlock can cause kernel hangs or system freezes during device initialization, leading to denial of service conditions. Organizations using Linux in critical infrastructure, industrial control systems, or endpoint devices with affected MediaTek hardware may experience operational disruptions. While confidentiality and integrity impacts are minimal since this is a deadlock rather than a direct code execution or privilege escalation vulnerability, the availability impact can be significant, especially in environments requiring high uptime or real-time responsiveness. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the deadlock, which could be leveraged by attackers to disrupt services.
Mitigation Recommendations
To mitigate CVE-2024-27002, European organizations should: 1) Apply the latest Linux kernel updates that include the patch for this vulnerability, ensuring all MediaTek clock controller drivers are updated to the fixed versions. 2) For embedded or IoT devices using MediaTek chipsets, coordinate with device vendors or manufacturers to obtain firmware or kernel updates incorporating the fix. 3) Implement rigorous testing of kernel updates in staging environments to verify that the fix does not introduce regressions in device initialization or power management. 4) Monitor system logs for signs of kernel deadlocks or hangs related to clock or power domain drivers, enabling early detection of potential issues. 5) Where possible, isolate or limit access to vulnerable devices to reduce the risk of accidental triggering of the deadlock by untrusted users or processes. 6) Maintain an inventory of Linux systems using MediaTek hardware to prioritize patch deployment and risk assessment. These steps go beyond generic advice by focusing on hardware-specific updates, vendor coordination, and proactive monitoring tailored to the nature of this concurrency vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-27002: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: Do a runtime PM get on controllers during probe mt8183-mfgcfg has a mutual dependency with genpd during the probing stage, which leads to a deadlock in the following call stack: CPU0: genpd_lock --> clk_prepare_lock genpd_power_off_work_fn() genpd_lock() generic_pm_domain::power_off() clk_unprepare() clk_prepare_lock() CPU1: clk_prepare_lock --> genpd_lock clk_register() __clk_core_init() clk_prepare_lock() clk_pm_runtime_get() genpd_lock() Do a runtime PM get at the probe function to make sure clk_register() won't acquire the genpd lock. Instead of only modifying mt8183-mfgcfg, do this on all mediatek clock controller probings because we don't believe this would cause any regression. Verified on MT8183 and MT8192 Chromebooks.
AI-Powered Analysis
Technical Analysis
CVE-2024-27002 is a vulnerability identified in the Linux kernel affecting the MediaTek clock controller drivers, specifically related to the runtime power management (PM) and device probing sequence. The issue arises from a mutual dependency and locking order inversion between the MediaTek manufacturing configuration driver (mt8183-mfgcfg) and the generic power domain (genpd) subsystem during the device probe phase. This leads to a potential deadlock scenario involving two CPU cores where each core waits on a lock held by the other: CPU0 attempts to acquire the genpd_lock while holding clk_prepare_lock, and CPU1 attempts to acquire clk_prepare_lock while holding genpd_lock. The deadlock occurs because clk_register() indirectly calls clk_pm_runtime_get() which tries to acquire genpd_lock, but the locking order is inconsistent between the two subsystems. The fix involves performing a runtime PM get operation early during the probe function to ensure that clk_register() does not acquire the genpd_lock later, thereby preventing the lock inversion and deadlock. Although the vulnerability was verified on MediaTek MT8183 and MT8192 Chromebooks, the patch was applied broadly to all MediaTek clock controller probings in the Linux kernel to prevent regressions. This vulnerability is a kernel-level concurrency issue that can cause system hangs or freezes during device initialization, impacting system stability and availability. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-27002 is on the stability and availability of Linux-based systems running on affected MediaTek hardware platforms, particularly those using MT8183 and MT8192 SoCs or similar MediaTek clock controllers. This includes Chromebooks and potentially embedded or IoT devices that rely on these chipsets. The deadlock can cause kernel hangs or system freezes during device initialization, leading to denial of service conditions. Organizations using Linux in critical infrastructure, industrial control systems, or endpoint devices with affected MediaTek hardware may experience operational disruptions. While confidentiality and integrity impacts are minimal since this is a deadlock rather than a direct code execution or privilege escalation vulnerability, the availability impact can be significant, especially in environments requiring high uptime or real-time responsiveness. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the deadlock, which could be leveraged by attackers to disrupt services.
Mitigation Recommendations
To mitigate CVE-2024-27002, European organizations should: 1) Apply the latest Linux kernel updates that include the patch for this vulnerability, ensuring all MediaTek clock controller drivers are updated to the fixed versions. 2) For embedded or IoT devices using MediaTek chipsets, coordinate with device vendors or manufacturers to obtain firmware or kernel updates incorporating the fix. 3) Implement rigorous testing of kernel updates in staging environments to verify that the fix does not introduce regressions in device initialization or power management. 4) Monitor system logs for signs of kernel deadlocks or hangs related to clock or power domain drivers, enabling early detection of potential issues. 5) Where possible, isolate or limit access to vulnerable devices to reduce the risk of accidental triggering of the deadlock by untrusted users or processes. 6) Maintain an inventory of Linux systems using MediaTek hardware to prioritize patch deployment and risk assessment. These steps go beyond generic advice by focusing on hardware-specific updates, vendor coordination, and proactive monitoring tailored to the nature of this concurrency vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.207Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe307a
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 2:11:53 PM
Last updated: 8/6/2025, 12:36:08 AM
Views: 16
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.