CVE-2024-27002

5.5 MEDIUM

📋 TL;DR

A deadlock vulnerability in the Linux kernel's MediaTek clock controller driver can cause system instability or denial of service. The issue occurs during device probing when runtime power management and clock subsystems attempt to acquire locks in conflicting order, potentially freezing affected systems. This affects Linux systems with MediaTek hardware (particularly MT8183 and MT8192 chipsets).

💻 Affected Systems

Products:
  • Linux kernel with MediaTek clock controller drivers
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires MediaTek hardware (particularly MT8183, MT8192 chipsets) and the mediatek-clk driver to be loaded. Chromebooks with these chipsets are confirmed affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock causing complete unresponsiveness, requiring hard reboot and potential data loss or corruption.

🟠

Likely Case

System instability during boot or device initialization, leading to boot failures or intermittent system hangs.

🟢

If Mitigated

Minor performance impact during device initialization with proper patching.

🌐 Internet-Facing: LOW - This is a local kernel driver issue not directly exploitable over network.
🏢 Internal Only: MEDIUM - Can cause system instability affecting local services and applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

This is a race condition deadlock that requires specific timing during device initialization. Not directly exploitable for privilege escalation or remote access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 165d226472575b213dd90dfda19d1605dd7c19a8 or later

Vendor Advisory: https://git.kernel.org/stable/c/165d226472575b213dd90dfda19d1605dd7c19a8

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable affected clock controller

linux

Blacklist or prevent loading of mediatek-clk driver if not required

echo 'blacklist mediatek-clk' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u

🧯 If You Can't Patch

  • Avoid system reboots or hardware changes that trigger device re-probing
  • Monitor system logs for deadlock indicators and have manual recovery procedures ready

🔍 How to Verify

Check if Vulnerable:

Check if running kernel contains the fix commit: 'uname -r' and compare with patched versions from kernel git

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and check system logs for absence of deadlock messages during boot

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • 'INFO: task blocked for more than 120 seconds'
  • Deadlock detection warnings in dmesg

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

source="kernel" AND ("deadlock" OR "blocked for more than" OR "mediatek" OR "clk_register")

🔗 References

📤 Share & Export