CVE-2024-42088

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's MediaTek ASoC driver for mt8195 chipsets. The vulnerability occurs when the kernel attempts to access a platforms array that lacks proper initialization, potentially leading to kernel memory corruption. This affects Linux systems using MediaTek mt8195-based hardware with the vulnerable driver loaded.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek ASoC driver for mt8195
Versions: Linux kernel versions containing commit e70b8dd26711 up to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek mt8195 hardware and the specific ASoC driver loaded. The vulnerability is triggered when the audio subsystem initializes.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

Kernel panic and system crash when the vulnerable code path is triggered, resulting in denial of service.

🟢

If Mitigated

System remains stable as the vulnerable code path is not triggered during normal operation.

🌐 Internet-Facing: LOW - This requires local access or ability to trigger specific audio subsystem operations.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the vulnerability if they have access to audio subsystem operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the specific code path in mtk_soundcard_common_probe() during audio subsystem initialization. This is typically a local vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 282a4482e198e03781c152c88aac8aa382ef9a55 and 42b9ab7a4d7e6c5efd71847541e4fcc213585aad

Vendor Advisory: https://git.kernel.org/stable/c/282a4482e198e03781c152c88aac8aa382ef9a55

Restart Required: Yes

Instructions:

1. Update to a Linux kernel version containing the fix commits. 2. For distributions: apply kernel security updates from your vendor. 3. Reboot the system to load the patched kernel.

🔧 Temporary Workarounds

Disable affected audio driver

linux

Prevent loading of the vulnerable MediaTek ASoC driver module

echo 'blacklist snd-soc-mt8195' >> /etc/modprobe.d/blacklist.conf
rmmod snd-soc-mt8195

🧯 If You Can't Patch

  • Ensure systems are not using MediaTek mt8195 hardware or disable the affected audio functionality
  • Implement strict access controls to prevent unauthorized users from triggering audio subsystem operations

🔍 How to Verify

Check if Vulnerable:

Check if the system uses MediaTek mt8195 hardware and has the vulnerable kernel version: 'uname -r' and check kernel commit history for e70b8dd26711

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits 282a4482e198e03781c152c88aac8aa382ef9a55 or 42b9ab7a4d7e6c5efd71847541e4fcc213585aad

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN out-of-bounds warnings in kernel logs
  • Audio subsystem initialization failures

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("KASAN" OR "out-of-bounds" OR "mtk_soundcard_common_probe")

🔗 References

📤 Share & Export