Skip to main content

CVE-2024-38571: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-38571cvecve-2024-38571
Published: Wed Jun 19 2024 (06/19/2024, 13:35:36 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/tsens: Fix null pointer dereference compute_intercept_slope() is called from calibrate_8960() (in tsens-8960.c) as compute_intercept_slope(priv, p1, NULL, ONE_PT_CALIB) which lead to null pointer dereference (if DEBUG or DYNAMIC_DEBUG set). Fix this bug by adding null pointer check. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/29/2025, 11:27:13 UTC

Technical Analysis

CVE-2024-38571 is a vulnerability identified in the Linux kernel, specifically within the thermal sensor driver code for the tsens-8960 component. The issue arises in the function compute_intercept_slope(), which is invoked by calibrate_8960() in the tsens-8960.c source file. The vulnerability is triggered when compute_intercept_slope() is called with a NULL pointer as one of its parameters (specifically the third parameter), which leads to a null pointer dereference. This condition occurs if kernel debugging features such as DEBUG or DYNAMIC_DEBUG are enabled. The null pointer dereference can cause the kernel to crash or become unstable, resulting in a denial of service (DoS) condition. The root cause is the lack of a null pointer check before dereferencing the pointer in question. The fix implemented involves adding a null pointer check to prevent the dereference and thus avoid the crash. This vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE). There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions identified by the commit hash dfc1193d4dbd6c3cb68c944413146c940bde290a, indicating a specific patch or kernel snapshot. Since the issue is related to a kernel driver for thermal sensors on specific hardware platforms (likely Qualcomm Snapdragon 8960 SoC or similar), the impact is limited to systems running affected kernel versions with this hardware and debugging enabled.

Potential Impact

For European organizations, the primary impact of CVE-2024-38571 is the potential for denial of service on Linux systems running affected kernel versions with the tsens-8960 thermal sensor driver and debugging features enabled. This could lead to system crashes or reboots, causing temporary unavailability of critical services or infrastructure. The vulnerability does not appear to allow privilege escalation or remote code execution, limiting its impact to availability rather than confidentiality or integrity. However, organizations relying on embedded Linux devices, IoT systems, or specialized hardware platforms using the affected thermal sensor driver could face operational disruptions. Data centers, industrial control systems, or telecommunications infrastructure using such hardware might experience service interruptions if the vulnerability is triggered. Since the vulnerability requires debugging features to be enabled, which is uncommon in production environments, the risk to typical enterprise Linux servers is lower. Nonetheless, development, testing, or specialized environments with debugging enabled could be vulnerable. The absence of known exploits reduces immediate risk, but organizations should remain vigilant and apply patches promptly to prevent potential future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-38571, European organizations should: 1) Identify Linux systems running kernel versions containing the affected tsens-8960 driver code, especially those with debugging features (DEBUG or DYNAMIC_DEBUG) enabled. 2) Apply the official Linux kernel patch that adds the null pointer check to the compute_intercept_slope() function as soon as it becomes available in their distribution or kernel vendor updates. 3) Disable kernel debugging features in production environments unless explicitly required for troubleshooting, as these features increase the attack surface for this vulnerability. 4) For embedded or IoT devices using affected hardware, coordinate with device manufacturers or vendors to obtain firmware or kernel updates that address this issue. 5) Monitor system logs and kernel crash reports for signs of null pointer dereference or thermal sensor driver failures to detect potential exploitation attempts or instability. 6) Implement robust system monitoring and automated reboot or failover mechanisms to minimize downtime in case of unexpected kernel crashes. 7) Maintain an inventory of hardware platforms and kernel versions in use to quickly assess exposure to similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.923Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe29df

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:27:13 AM

Last updated: 7/27/2025, 2:34:45 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats