CVE-2024-27433

7.8 HIGH

📋 TL;DR

This CVE describes a double-free vulnerability in the Linux kernel's MediaTek clock driver for MT7622 and MT8135 chips. The vulnerability occurs when the kernel module is unloaded, potentially leading to memory corruption and kernel panic. Systems using affected MediaTek hardware with vulnerable kernel versions are at risk.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek MT7622/MT8135 clock driver support
Versions: Specific kernel versions containing the vulnerable commit; check git references for exact ranges
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek MT7622 or MT8135 hardware. The vulnerability is triggered when the clk-mt8135-apmixed module is unloaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System crash or instability when the affected kernel module is unloaded, causing denial of service.

🟢

If Mitigated

No impact if patched or if the vulnerable code path isn't triggered during normal operation.

🌐 Internet-Facing: LOW - Requires local access or kernel module manipulation, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the vulnerability, leading to system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to trigger kernel module unloading, typically needing local access and some privileges. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with the fix commits referenced in the CVE

Vendor Advisory: https://git.kernel.org/stable/c/a32e88f2b20259f5fe4f8eed598bbc85dc4879ed

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution's repositories. 2. Reboot the system to load the new kernel. 3. Verify the fix by checking kernel version.

🔧 Temporary Workarounds

Prevent module unloading

linux

Prevent the vulnerable kernel module from being unloaded to avoid triggering the double-free

echo 1 > /sys/module/clk_mt8135_apmixed/parameters/refcnt

🧯 If You Can't Patch

  • Restrict local user access to systems with affected hardware
  • Monitor for kernel panic events and system instability

🔍 How to Verify

Check if Vulnerable:

Check if system uses MediaTek MT7622/MT8135 hardware and has the vulnerable kernel module loaded: lsmod | grep clk_mt8135_apmixed

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions in git references, or verify the module can be unloaded without causing issues

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • OOM killer activity
  • System crash/reboot logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "double free")

🔗 References

📤 Share & Export