Skip to main content

CVE-2024-58034: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-58034cvecve-2024-58034
Published: Thu Feb 27 2025 (02/27/2025, 20:00:52 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() As of_find_node_by_name() release the reference of the argument device node, tegra_emc_find_node_by_ram_code() releases some device nodes while still in use, resulting in possible UAFs. According to the bindings and the in-tree DTS files, the "emc-tables" node is always device's child node with the property "nvidia,use-ram-code", and the "lpddr2" node is a child of the "emc-tables" node. Thus utilize the for_each_child_of_node() macro and of_get_child_by_name() instead of of_find_node_by_name() to simplify the code. This bug was found by an experimental verification tool that I am developing. [krzysztof: applied v1, adjust the commit msg to incorporate v2 parts]

AI-Powered Analysis

AILast updated: 07/02/2025, 21:57:15 UTC

Technical Analysis

CVE-2024-58034 is a high-severity use-after-free (UAF) vulnerability in the Linux kernel, specifically within the memory management code related to the Tegra20 EMC (External Memory Controller) driver. The vulnerability arises from improper handling of device tree nodes in the function tegra_emc_find_node_by_ram_code(). The root cause is that this function releases references to device nodes prematurely while they are still in use, due to incorrect use of the of_find_node_by_name() API. This leads to potential use-after-free conditions, which can cause memory corruption. The vulnerability affects the Linux kernel versions identified by the commit hash 96e5da7c842424bcf64afe1082b960b42b96190b. The issue was discovered through an experimental verification tool and fixed by changing the code to use safer device tree traversal macros such as for_each_child_of_node() and of_get_child_by_name(), which correctly manage node references. The vulnerability is classified under CWE-416 (Use After Free) and has a CVSS v3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning exploitation could lead to full system compromise or denial of service. No known exploits are currently reported in the wild. The vulnerability is specific to the Tegra20 platform, which is an NVIDIA SoC commonly used in embedded systems and some Linux-based devices. The fix involves proper reference counting and node traversal to prevent premature freeing of device nodes.

Potential Impact

For European organizations, the impact of CVE-2024-58034 depends largely on the presence of Linux systems running on Tegra20-based hardware. Such hardware is typically found in embedded devices, industrial control systems, automotive infotainment, and specialized computing platforms rather than general-purpose servers or desktops. If these devices are part of critical infrastructure, manufacturing environments, or IoT deployments, exploitation could lead to local privilege escalation, arbitrary code execution, or denial of service, potentially disrupting operations or enabling lateral movement within networks. Given the high confidentiality, integrity, and availability impact, attackers could gain unauthorized access to sensitive data or disrupt critical services. However, the local attack vector and requirement for low privileges limit remote exploitation, meaning attackers would need initial access to the device. European organizations using Tegra20-based Linux devices in sensitive environments should consider this vulnerability a significant risk, especially in sectors like automotive, manufacturing, and embedded systems in critical infrastructure.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2024-58034 as soon as they become available from trusted sources or Linux distributions. 2. Identify all Tegra20-based devices running vulnerable Linux kernel versions within the organization’s environment using asset management and vulnerability scanning tools. 3. For embedded or IoT devices that cannot be easily patched, consider network segmentation and strict access controls to limit local access to these devices. 4. Implement strict privilege separation and minimize the number of users or processes with local access to affected devices to reduce the attack surface. 5. Monitor logs and system behavior for signs of exploitation attempts, such as crashes or unusual memory access patterns related to the EMC driver. 6. Engage with device vendors to obtain firmware or kernel updates if the devices are third-party products. 7. For development or testing environments, use static and dynamic analysis tools to detect similar use-after-free issues proactively. 8. Educate system administrators and security teams about the specific nature of this vulnerability to ensure timely response and patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:16:34.052Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde1e5

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 7/2/2025, 9:57:15 PM

Last updated: 8/14/2025, 7:57:51 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats