Skip to main content

CVE-2024-35842: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35842cvecve-2024-35842
Published: Fri May 17 2024 (05/17/2024, 14:27:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: sof-common: Add NULL check for normal_link string It's not granted that all entries of struct sof_conn_stream declare a `normal_link` (a non-SOF, direct link) string, and this is the case for SoCs that support only SOF paths (hence do not support both direct and SOF usecases). For example, in the case of MT8188 there is no normal_link string in any of the sof_conn_stream entries and there will be more drivers doing that in the future. To avoid possible NULL pointer KPs, add a NULL check for `normal_link`.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:27:35 UTC

Technical Analysis

CVE-2024-35842 is a vulnerability identified in the Linux kernel specifically within the ASoC (ALSA System on Chip) Mediatek sof-common driver component. The issue arises due to the lack of a NULL pointer check for the 'normal_link' string within the struct sof_conn_stream entries. This struct is used to represent audio stream connections in SoCs that support Sound Open Firmware (SOF) paths and potentially direct (non-SOF) audio links. However, certain SoCs, such as the Mediatek MT8188, only support SOF paths and do not have a 'normal_link' string defined in their sof_conn_stream entries. Without a NULL check, attempts to access this pointer can lead to a NULL pointer dereference, causing kernel panics (KPs) and potentially crashing the system. The patch involves adding a NULL check before dereferencing the 'normal_link' pointer to prevent such crashes. This vulnerability is a stability and availability issue rather than a direct security compromise vector like privilege escalation or data leakage. There are no known exploits in the wild, and the vulnerability was published on May 17, 2024. The affected versions correspond to specific Linux kernel commits prior to the fix. No CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2024-35842 is on system stability and availability, particularly for devices running Linux kernels with affected Mediatek ASoC drivers. This is especially relevant for embedded systems, IoT devices, and specialized hardware using Mediatek SoCs with SOF audio paths. A kernel panic triggered by this vulnerability could cause unexpected system reboots or downtime, disrupting critical services or operations. While it does not directly lead to confidentiality or integrity breaches, the availability impact can be significant in environments relying on continuous operation, such as telecommunications infrastructure, industrial control systems, or multimedia processing equipment. Organizations deploying Linux-based devices with Mediatek SoCs should be aware of potential service interruptions and plan accordingly. Since no exploits are known, the immediate risk is low, but unpatched systems remain vulnerable to accidental crashes or potential future exploitation if attackers find ways to trigger the NULL pointer dereference maliciously.

Mitigation Recommendations

To mitigate CVE-2024-35842, European organizations should: 1) Apply the official Linux kernel patches that add the NULL pointer check for the 'normal_link' string in the Mediatek sof-common driver as soon as they become available. 2) For embedded or specialized devices, coordinate with hardware vendors or maintainers to ensure updated firmware or kernel versions are deployed. 3) Implement robust monitoring and alerting for kernel panics or unexpected reboots on affected systems to detect potential exploitation or stability issues early. 4) Conduct thorough testing of updated kernels in staging environments to verify that the patch does not introduce regressions. 5) Where possible, isolate critical systems using affected SoCs from untrusted networks to reduce the risk of remote triggering of the vulnerability. 6) Maintain an inventory of devices using Mediatek SoCs with SOF audio paths to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on vendor coordination, monitoring, and inventory management specific to the affected component and hardware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.104Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3625

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:27:35 PM

Last updated: 8/3/2025, 12:28:34 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats