Skip to main content

CVE-2024-27075: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-27075cvecve-2024-27075
Published: Wed May 01 2024 (05/01/2024, 13:04:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid stack overflow warnings with clang A previous patch worked around a KASAN issue in stv0367, now a similar problem showed up with clang: drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than] 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe) Rework the stv0367_writereg() function to be simpler and mark both register access functions as noinline_for_stack so the temporary i2c_msg structures do not get duplicated on the stack when KASAN_STACK is enabled.

AI-Powered Analysis

AILast updated: 06/28/2025, 02:56:51 UTC

Technical Analysis

CVE-2024-27075 is a vulnerability identified in the Linux kernel specifically within the media subsystem's DVB (Digital Video Broadcasting) frontend driver for the stv0367 chip. The issue arises due to excessive stack frame size in the function stv0367ter_set_frontend, which exceeds the compiler's stack size limit when compiled with the Clang compiler. This large stack frame triggers a warning treated as an error (-Werror,-Wframe-larger-than), indicating a potential stack overflow risk. The root cause is related to the handling of temporary i2c_msg structures that get duplicated on the stack when Kernel Address Sanitizer (KASAN) with stack mode (KASAN_STACK) is enabled. The vulnerability was addressed by simplifying the stv0367_writereg() function and marking the register access functions as noinline_for_stack, preventing duplication of large temporary structures on the stack and thus avoiding stack overflow warnings and potential overflows. This fix improves kernel stability and security by preventing stack corruption in the DVB frontend driver. The vulnerability affects multiple Linux kernel versions as indicated by the affected commit hashes. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-27075 is primarily related to systems running Linux kernels with DVB frontend drivers for the stv0367 chip, which are commonly used in digital TV receivers, set-top boxes, and multimedia devices. If exploited, a stack overflow could potentially lead to kernel crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context. This could compromise system integrity and availability, particularly in environments relying on Linux-based media devices or embedded systems. While the vulnerability requires the presence of specific hardware drivers and kernel configurations (KASAN_STACK enabled), organizations using Linux in multimedia or broadcasting infrastructure should be aware. The absence of known exploits reduces immediate risk, but the potential for kernel-level compromise means that affected systems could be attractive targets for attackers aiming to disrupt services or gain elevated privileges.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify Linux systems using the DVB frontend driver for stv0367, particularly those compiled with Clang and with KASAN_STACK enabled. 2) Apply the official Linux kernel patches that rework the stv0367_writereg() function and mark register access functions as noinline_for_stack to prevent stack overflow conditions. 3) Rebuild and deploy updated kernel versions promptly to affected devices, especially embedded multimedia systems and set-top boxes. 4) If patching is not immediately feasible, consider disabling KASAN_STACK or avoiding the use of Clang for kernel compilation on affected systems as a temporary workaround, understanding this may reduce debugging capabilities. 5) Monitor kernel logs for stack overflow warnings or crashes related to the DVB frontend driver. 6) Implement strict access controls and monitoring on devices running these drivers to detect potential exploitation attempts. 7) Coordinate with hardware vendors for firmware or driver updates if devices use proprietary or customized Linux kernels.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.217Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbddbcc

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 2:56:51 AM

Last updated: 8/9/2025, 10:33:07 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats