Skip to main content

CVE-2024-46849: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46849cvecve-2024-46849
Published: Fri Sep 27 2024 (09/27/2024, 12:42:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated. Kasan bug report: ================================================================== BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc Read of size 8 at addr ffff000000e8b260 by task modprobe/356 CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1 Call trace: dump_backtrace+0x94/0xec show_stack+0x18/0x24 dump_stack_lvl+0x78/0x90 print_report+0xfc/0x5c0 kasan_report+0xb8/0xfc __asan_load8+0x9c/0xb8 axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card] meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils] platform_probe+0x8c/0xf4 really_probe+0x110/0x39c __driver_probe_device+0xb8/0x18c driver_probe_device+0x108/0x1d8 __driver_attach+0xd0/0x25c bus_for_each_dev+0xe0/0x154 driver_attach+0x34/0x44 bus_add_driver+0x134/0x294 driver_register+0xa8/0x1e8 __platform_driver_register+0x44/0x54 axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card] do_one_initcall+0xdc/0x25c do_init_module+0x10c/0x334 load_module+0x24c4/0x26cc init_module_from_file+0xd4/0x128 __arm64_sys_finit_module+0x1f4/0x41c invoke_syscall+0x60/0x188 el0_svc_common.constprop.0+0x78/0x13c do_el0_svc+0x30/0x40 el0_svc+0x38/0x78 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194

AI-Powered Analysis

AILast updated: 06/28/2025, 18:41:42 UTC

Technical Analysis

CVE-2024-46849 is a use-after-free vulnerability identified in the Linux kernel specifically within the ASoC (ALSA System on Chip) meson axg-card audio driver. The vulnerability arises due to improper handling of the 'card->dai_link' buffer during reallocation in the function 'meson_card_reallocate_links()'. The issue occurs because the pointer 'pad' is initialized before the buffer is reallocated, leading to a use-after-free condition when the buffer is freed and reallocated but the pointer still references the old memory. This was detected by the Kernel Address Sanitizer (KASAN) as a slab-use-after-free error during the execution of the 'axg_card_add_link' function. The vulnerability is triggered during module loading (e.g., via modprobe), and the call stack indicates that the flaw is in the sound card driver initialization routines for the meson axg platform. Exploitation of this vulnerability could lead to reading or writing freed memory, potentially causing kernel crashes (denial of service) or enabling escalation of privileges if exploited by a local attacker. The vulnerability affects Linux kernel versions containing the affected meson axg-card driver code prior to the fix, which moves the pointer initialization after the buffer reallocation to prevent use-after-free. No public exploits are currently known, and no CVSS score has been assigned yet. The vulnerability is relevant for systems running Linux kernels with the meson axg sound card driver, commonly found in ARM64-based embedded devices or SoCs using the Amlogic Meson AXG platform.

Potential Impact

For European organizations, the impact of CVE-2024-46849 depends on the deployment of Linux systems running the affected meson axg-card driver. This vulnerability primarily affects embedded Linux devices using Amlogic Meson AXG SoCs, which are often found in consumer electronics, IoT devices, and specialized industrial equipment. If such devices are used within European enterprises or critical infrastructure, exploitation could lead to kernel crashes causing denial of service or potentially privilege escalation attacks by local users or malicious insiders. This could disrupt operations, especially in environments relying on embedded Linux systems for audio processing or control. While remote exploitation is unlikely without local access, compromised devices could serve as footholds for lateral movement or persistent threats. The absence of known exploits reduces immediate risk, but the vulnerability's presence in kernel-level code means that successful exploitation could severely impact confidentiality, integrity, and availability of affected systems. Organizations in sectors such as manufacturing, telecommunications, and smart city infrastructure that deploy ARM64 embedded Linux devices should be particularly vigilant.

Mitigation Recommendations

To mitigate CVE-2024-46849, European organizations should: 1) Identify and inventory all Linux systems running kernels with the meson axg-card driver, particularly embedded devices using Amlogic Meson AXG SoCs. 2) Apply the official Linux kernel patches that fix the use-after-free by ensuring pointer initialization occurs after buffer reallocation, as indicated in the Linux kernel commit history. 3) If immediate patching is not feasible, consider disabling or unloading the affected sound card driver module to prevent exploitation, if audio functionality is not critical. 4) Implement strict access controls to limit local user access on vulnerable devices, reducing the risk of exploitation by unauthorized users. 5) Monitor system logs and kernel messages for signs of KASAN reports or unusual module loading failures that may indicate exploitation attempts. 6) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enable Kernel Page Table Isolation (KPTI) where applicable to reduce exploitation likelihood. 7) Coordinate with device vendors to obtain updated firmware or kernel versions that incorporate the fix. 8) Include this vulnerability in vulnerability management and patching cycles to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.290Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe030f

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:41:42 PM

Last updated: 7/28/2025, 10:26:38 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats