CVE-2024-58081: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: clk: mmp2: call pm_genpd_init() only after genpd.name is set Setting the genpd's struct device's name with dev_set_name() is happening within pm_genpd_init(). If it remains NULL, things can blow up later, such as when crafting the devfs hierarchy for the power domain: Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read ... Call trace: strlen from start_creating+0x90/0x138 start_creating from debugfs_create_dir+0x20/0x178 debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144 genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90 genpd_debug_init from do_one_initcall+0x5c/0x244 do_one_initcall from kernel_init_freeable+0x19c/0x1f4 kernel_init_freeable from kernel_init+0x1c/0x12c kernel_init from ret_from_fork+0x14/0x28 Bisecting tracks this crash back to commit 899f44531fe6 ("pmdomain: core: Add GENPD_FLAG_DEV_NAME_FW flag"), which exchanges use of genpd->name with dev_name(&genpd->dev) in genpd_debug_add.part().
AI Analysis
Technical Summary
CVE-2024-58081 is a vulnerability identified in the Linux kernel related to the initialization sequence of power management generic power domains (genpd) within the clk subsystem, specifically the mmp2 driver. The root cause lies in the improper ordering of function calls during the initialization process. The function pm_genpd_init() is called before the genpd.name field is set via dev_set_name(), which leads to a NULL pointer dereference when the kernel attempts to create the devfs hierarchy for the power domain. This results in a kernel crash during early initialization, as evidenced by the kernel panic trace involving strlen and debugfs_create_dir calls. The issue was introduced by commit 899f44531fe6cac4b024710fec647ecc127724b8, which replaced direct use of genpd->name with dev_name(&genpd->dev) in the genpd_debug_add function. Because the device name remains NULL at the time pm_genpd_init() is called, the kernel dereferences a NULL pointer, causing an unrecoverable fault. This vulnerability affects specific Linux kernel versions identified by the commit hashes listed, and it manifests during system boot or module initialization phases. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability primarily impacts system stability and availability by causing kernel panics, which can lead to denial of service conditions on affected systems.
Potential Impact
For European organizations, the impact of CVE-2024-58081 centers on system availability and reliability, particularly for those running affected Linux kernel versions in production environments. Systems using the affected clk mmp2 driver or related power management subsystems may experience kernel panics during boot or runtime, leading to unexpected downtime. This can disrupt critical services, especially in sectors relying heavily on Linux-based infrastructure such as telecommunications, finance, manufacturing, and public services. The vulnerability does not appear to allow privilege escalation or data compromise directly but can cause denial of service through system crashes. Organizations operating embedded Linux devices or specialized hardware using the mmp2 clock driver are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate risk, as attackers or malware could potentially trigger the kernel panic remotely or locally if they can influence device initialization. The impact on confidentiality and integrity is minimal; however, availability degradation can have cascading effects on business operations and service delivery.
Mitigation Recommendations
To mitigate CVE-2024-58081, European organizations should: 1) Identify and inventory Linux systems running kernel versions containing the vulnerable commits, especially those using the mmp2 clock driver or related power management components. 2) Apply the official patches or kernel updates that reorder the initialization sequence to ensure dev_set_name() is called before pm_genpd_init(), thereby preventing NULL pointer dereferences. 3) For systems where immediate patching is not feasible, consider disabling or blacklisting the affected driver if it is not critical to operations, to avoid triggering the vulnerability. 4) Implement robust monitoring for kernel panics and system reboots to detect potential exploitation or accidental triggers early. 5) Test kernel updates in staging environments to ensure compatibility and stability before deployment. 6) Maintain close coordination with Linux kernel maintainers and subscribe to security advisories for timely updates. 7) For embedded or specialized devices, coordinate with hardware vendors for firmware or kernel patches addressing this issue. These steps go beyond generic advice by focusing on driver-specific mitigation and operational controls tailored to the vulnerability's nature.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-58081: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: clk: mmp2: call pm_genpd_init() only after genpd.name is set Setting the genpd's struct device's name with dev_set_name() is happening within pm_genpd_init(). If it remains NULL, things can blow up later, such as when crafting the devfs hierarchy for the power domain: Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read ... Call trace: strlen from start_creating+0x90/0x138 start_creating from debugfs_create_dir+0x20/0x178 debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144 genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90 genpd_debug_init from do_one_initcall+0x5c/0x244 do_one_initcall from kernel_init_freeable+0x19c/0x1f4 kernel_init_freeable from kernel_init+0x1c/0x12c kernel_init from ret_from_fork+0x14/0x28 Bisecting tracks this crash back to commit 899f44531fe6 ("pmdomain: core: Add GENPD_FLAG_DEV_NAME_FW flag"), which exchanges use of genpd->name with dev_name(&genpd->dev) in genpd_debug_add.part().
AI-Powered Analysis
Technical Analysis
CVE-2024-58081 is a vulnerability identified in the Linux kernel related to the initialization sequence of power management generic power domains (genpd) within the clk subsystem, specifically the mmp2 driver. The root cause lies in the improper ordering of function calls during the initialization process. The function pm_genpd_init() is called before the genpd.name field is set via dev_set_name(), which leads to a NULL pointer dereference when the kernel attempts to create the devfs hierarchy for the power domain. This results in a kernel crash during early initialization, as evidenced by the kernel panic trace involving strlen and debugfs_create_dir calls. The issue was introduced by commit 899f44531fe6cac4b024710fec647ecc127724b8, which replaced direct use of genpd->name with dev_name(&genpd->dev) in the genpd_debug_add function. Because the device name remains NULL at the time pm_genpd_init() is called, the kernel dereferences a NULL pointer, causing an unrecoverable fault. This vulnerability affects specific Linux kernel versions identified by the commit hashes listed, and it manifests during system boot or module initialization phases. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability primarily impacts system stability and availability by causing kernel panics, which can lead to denial of service conditions on affected systems.
Potential Impact
For European organizations, the impact of CVE-2024-58081 centers on system availability and reliability, particularly for those running affected Linux kernel versions in production environments. Systems using the affected clk mmp2 driver or related power management subsystems may experience kernel panics during boot or runtime, leading to unexpected downtime. This can disrupt critical services, especially in sectors relying heavily on Linux-based infrastructure such as telecommunications, finance, manufacturing, and public services. The vulnerability does not appear to allow privilege escalation or data compromise directly but can cause denial of service through system crashes. Organizations operating embedded Linux devices or specialized hardware using the mmp2 clock driver are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate risk, as attackers or malware could potentially trigger the kernel panic remotely or locally if they can influence device initialization. The impact on confidentiality and integrity is minimal; however, availability degradation can have cascading effects on business operations and service delivery.
Mitigation Recommendations
To mitigate CVE-2024-58081, European organizations should: 1) Identify and inventory Linux systems running kernel versions containing the vulnerable commits, especially those using the mmp2 clock driver or related power management components. 2) Apply the official patches or kernel updates that reorder the initialization sequence to ensure dev_set_name() is called before pm_genpd_init(), thereby preventing NULL pointer dereferences. 3) For systems where immediate patching is not feasible, consider disabling or blacklisting the affected driver if it is not critical to operations, to avoid triggering the vulnerability. 4) Implement robust monitoring for kernel panics and system reboots to detect potential exploitation or accidental triggers early. 5) Test kernel updates in staging environments to ensure compatibility and stability before deployment. 6) Maintain close coordination with Linux kernel maintainers and subscribe to security advisories for timely updates. 7) For embedded or specialized devices, coordinate with hardware vendors for firmware or kernel patches addressing this issue. These steps go beyond generic advice by focusing on driver-specific mitigation and operational controls tailored to the vulnerability's nature.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-06T15:52:09.183Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd265
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 11:09:52 PM
Last updated: 7/27/2025, 3:39:14 PM
Views: 10
Related Threats
CVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumCVE-2025-8836: Reachable Assertion in JasPer
MediumCVE-2025-8747: CWE-502 Deserialization of Untrusted Data in Google Keras
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.