Skip to main content

CVE-2024-58011: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-58011cvecve-2024-58011
Published: Thu Feb 27 2025 (02/27/2025, 02:12:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Check for adev == NULL Not all devices have an ACPI companion fwnode, so adev might be NULL. This can e.g. (theoretically) happen when a user manually binds one of the int3472 drivers to another i2c/platform device through sysfs. Add a check for adev not being set and return -ENODEV in that case to avoid a possible NULL pointer deref in skl_int3472_get_acpi_buffer().

AI-Powered Analysis

AILast updated: 06/28/2025, 09:56:08 UTC

Technical Analysis

CVE-2024-58011 is a vulnerability identified in the Linux kernel specifically affecting the platform/x86 subsystem related to the int3472 driver. The issue arises because not all devices have an ACPI companion firmware node (fwnode), which means the associated ACPI device pointer (adev) can be NULL. This situation can theoretically occur if a user manually binds one of the int3472 drivers to another I2C or platform device via sysfs. Without proper validation, the kernel function skl_int3472_get_acpi_buffer() may dereference this NULL pointer, leading to a potential kernel NULL pointer dereference vulnerability. The fix involves adding a check to ensure that adev is not NULL before proceeding, returning an error code (-ENODEV) if the pointer is unset, thereby preventing the NULL pointer dereference. This vulnerability is rooted in improper input validation and error handling in the kernel driver code. Although no known exploits are currently reported in the wild, the vulnerability could be triggered by local users with the ability to manipulate device bindings, potentially causing a denial of service (kernel crash) or other unintended kernel behavior. The affected versions are identified by a specific commit hash, indicating that the issue is present in certain Linux kernel builds prior to the patch. No CVSS score has been assigned yet, and no public exploit code is available at this time.

Potential Impact

For European organizations, the impact of CVE-2024-58011 is primarily related to system stability and availability. Since the vulnerability can cause a kernel NULL pointer dereference, exploitation could lead to a denial of service (system crash or kernel panic) on affected Linux systems. This is particularly relevant for servers, embedded devices, or workstations running Linux kernels with the vulnerable int3472 driver. Organizations relying on Linux-based infrastructure, especially those using hardware that involves the int3472 driver (commonly related to Intel Skylake platforms and associated ACPI devices), may experience service disruptions if the vulnerability is exploited. Although remote exploitation is unlikely due to the requirement for local manipulation of device bindings, insider threats or compromised user accounts with sufficient privileges could trigger the issue. The vulnerability does not appear to allow privilege escalation or remote code execution directly, limiting its impact to availability concerns. However, in critical environments such as industrial control systems, telecommunications, or cloud service providers in Europe, even temporary outages can have significant operational and financial consequences.

Mitigation Recommendations

European organizations should apply the following specific mitigations: 1) Update Linux kernels to the latest patched versions that include the fix for CVE-2024-58011, ensuring the check for adev NULL pointers is implemented. 2) Restrict access to sysfs interfaces that allow manual binding of drivers to devices, limiting this capability to trusted administrators only. 3) Implement strict user privilege management to prevent unprivileged or unauthorized users from manipulating device bindings. 4) Monitor kernel logs for any abnormal behavior or crashes related to the int3472 driver or ACPI device bindings. 5) For critical systems, consider deploying kernel live patching solutions to apply fixes without downtime. 6) Conduct thorough hardware and software inventory to identify systems using the vulnerable driver and prioritize patching accordingly. 7) Engage with hardware vendors and Linux distribution maintainers to confirm the presence of the fix in distribution-specific kernel versions used within the organization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:10:48.227Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdecea

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 9:56:08 AM

Last updated: 7/31/2025, 3:45:59 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats