CVE-2024-35842
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's MediaTek ASoC (Audio System on Chip) subsystem could cause kernel panics when accessing uninitialized 'normal_link' strings in sof_conn_stream structures. This affects Linux systems with MediaTek SoCs that use SOF (Sound Open Firmware) audio paths, particularly MT8188 and similar chips. The vulnerability requires local access to trigger.
💻 Affected Systems
- Linux kernel with MediaTek ASoC SOF support
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local attacker triggers kernel panic leading to denial of service (system crash), potentially causing data loss or service disruption.
Likely Case
Accidental triggering by legitimate audio operations causing system instability or crashes in affected configurations.
If Mitigated
Minor system instability with no privilege escalation or data compromise.
🎯 Exploit Status
Requires local access to trigger through audio subsystem operations. No known public exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in Linux kernel stable commits: b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd, cad471227a37c0c7c080bfc9ed01b53750e82afe, cde6ca5872bf67744dffa875a7cb521ab007b7ef, e3b3ec967a7d93b9010a5af9a2394c8b5c8f31ed
Vendor Advisory: https://git.kernel.org/stable/c/b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable affected audio drivers
linuxBlacklist or disable MediaTek ASoC SOF drivers if not needed
echo 'blacklist snd-soc-mt8188' > /etc/modprobe.d/disable-mtk-audio.conf
update-initramfs -u
🧯 If You Can't Patch
- Restrict local user access to systems with affected MediaTek hardware
- Monitor system logs for kernel panic events related to audio subsystem
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if using MediaTek ASoC SOF drivers: 'uname -r' and 'lsmod | grep snd-soc-mtk'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits: 'uname -r' and check kernel changelog for commit hashes
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- NULL pointer dereference errors mentioning 'normal_link' or 'sof_conn_stream'
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "kernel panic") AND ("normal_link" OR "sof_conn_stream" OR "ASoC" OR "MediaTek")
🔗 References
- https://git.kernel.org/stable/c/b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd
- https://git.kernel.org/stable/c/cad471227a37c0c7c080bfc9ed01b53750e82afe
- https://git.kernel.org/stable/c/cde6ca5872bf67744dffa875a7cb521ab007b7ef
- https://git.kernel.org/stable/c/e3b3ec967a7d93b9010a5af9a2394c8b5c8f31ed
- https://git.kernel.org/stable/c/b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd
- https://git.kernel.org/stable/c/cad471227a37c0c7c080bfc9ed01b53750e82afe
- https://git.kernel.org/stable/c/cde6ca5872bf67744dffa875a7cb521ab007b7ef
- https://git.kernel.org/stable/c/e3b3ec967a7d93b9010a5af9a2394c8b5c8f31ed