Skip to main content

CVE-2024-57904: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-57904cvecve-2024-57904
Published: Sun Jan 19 2025 (01/19/2025, 11:52:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implementation of at91_ts_register() calls input_free_deivce() on st->ts_input, however, the err label can be reached before the allocated iio_dev is stored to st->ts_input. Thus call input_free_device() on input instead of st->ts_input.

AI-Powered Analysis

AILast updated: 06/28/2025, 08:54:29 UTC

Technical Analysis

CVE-2024-57904 is a vulnerability identified in the Linux kernel specifically related to the Industrial I/O (IIO) subsystem's ADC (Analog-to-Digital Converter) driver for Atmel AT91 microcontrollers. The issue arises in the at91_ts_register() function, which is responsible for registering the touchscreen input device. The vulnerability is due to improper handling of the input device freeing process. In the current implementation, input_free_device() is called on st->ts_input during error handling. However, the err label can be reached before the allocated iio_dev is assigned to st->ts_input, leading to a call to input_free_device() on an uninitialized or incorrect pointer (input instead of st->ts_input). This can cause use-after-free or double-free conditions, potentially leading to kernel memory corruption or system instability. Although the vulnerability does not have a CVSS score yet and no known exploits are reported in the wild, the flaw in kernel memory management could be leveraged by a local attacker to cause denial of service (system crash) or possibly escalate privileges by corrupting kernel memory structures. The affected versions are identified by a specific commit hash, indicating that this vulnerability impacts certain Linux kernel builds prior to the patch. The vulnerability is technical and low-level, affecting the Linux kernel's device driver code for specific hardware platforms using the AT91 ADC touchscreen driver.

Potential Impact

For European organizations, the impact of CVE-2024-57904 depends on their use of Linux-based systems running kernels with the vulnerable AT91 ADC touchscreen driver. This is particularly relevant for organizations deploying embedded Linux devices, industrial control systems, or IoT devices that utilize Atmel AT91 microcontrollers. Potential impacts include system crashes or instability, which can disrupt critical services or industrial processes. In environments where Linux is used as a base for critical infrastructure, such as manufacturing, transportation, or energy sectors, exploitation could lead to operational downtime and safety risks. Although exploitation requires local access, compromised or untrusted users could trigger the vulnerability to escalate privileges or cause denial of service. The vulnerability does not appear to affect general-purpose Linux servers or desktops unless they specifically use the affected driver, limiting the scope but increasing risk in specialized environments. Given the widespread use of Linux in European industry and embedded systems, organizations should assess their exposure carefully.

Mitigation Recommendations

To mitigate CVE-2024-57904, European organizations should: 1) Identify and inventory all Linux systems running kernels with the vulnerable AT91 ADC touchscreen driver, focusing on embedded and industrial devices. 2) Apply the official Linux kernel patches that correct the input_free_device() call sequence in at91_ts_register() as soon as they become available from trusted Linux kernel maintainers or vendor distributions. 3) For devices where patching the kernel is not immediately feasible, consider isolating or restricting access to local users to prevent exploitation. 4) Implement strict access controls and monitoring on embedded devices to detect unusual behavior or crashes that may indicate exploitation attempts. 5) Engage with device vendors and suppliers to ensure firmware and kernel updates are provided and deployed promptly. 6) Conduct thorough testing of updated kernels in controlled environments before wide deployment to avoid regressions. 7) Maintain up-to-date backups and incident response plans tailored for embedded and industrial Linux systems to minimize downtime in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-19T11:50:08.372Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde9ed

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 8:54:29 AM

Last updated: 7/30/2025, 11:56:01 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats