CVE-2024-38621

7.1 HIGH

📋 TL;DR

This CVE describes a buffer overflow vulnerability in the Linux kernel's stk1160 video driver. The flaw allows attackers to write beyond allocated memory bounds, potentially leading to system crashes or arbitrary code execution. Systems using the stk1160 driver for video capture devices are affected.

💻 Affected Systems

Products:
  • Linux kernel with stk1160 driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the stk1160 video capture driver. Most systems won't have this driver loaded by default unless using compatible USB video capture devices.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

System remains stable with proper access controls preventing local user exploitation.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: MEDIUM - Local users could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of the stk1160 driver usage. Exploitation would need to trigger the vulnerable copy_video() function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 7532bcec0797adfa08791301c3bcae14141db3bd, a08492832cc4cacc24e0612f483c86ca899b9261, a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7, b504518a397059e1d55c521ba0ea2b545a6c4b52, d410017a7181cb55e4a5c810b32b75e4416c6808

Vendor Advisory: https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify stk1160 driver is not loaded if not needed.

🔧 Temporary Workarounds

Disable stk1160 driver

linux

Prevent loading of the vulnerable driver module

echo 'blacklist stk1160' >> /etc/modprobe.d/blacklist-stk1160.conf
rmmod stk1160

🧯 If You Can't Patch

  • Restrict local user access to systems with stk1160 devices
  • Disconnect or disable stk1160 compatible USB video capture devices

🔍 How to Verify

Check if Vulnerable:

Check if stk1160 module is loaded: lsmod | grep stk1160. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and stk1160 module version matches patched kernel.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes when using video capture
  • dmesg errors related to stk1160

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or module loading failures related to stk1160

🔗 References

📤 Share & Export