CVE-2024-46810
📋 TL;DR
This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's tc358767 display bridge driver. It occurs when the driver signals a Hot Plug Detect (HPD) event before the connector is fully initialized, potentially causing kernel crashes. Systems using affected Linux kernel versions with tc358767 bridge hardware are vulnerable.
💻 Affected Systems
- Linux kernel with tc358767 bridge driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.
Likely Case
System instability or crash when hot-plugging display devices, resulting in temporary denial of service.
If Mitigated
Minor system disruption requiring manual intervention to recover.
🎯 Exploit Status
Exploitation requires triggering HPD events on vulnerable hardware, typically through physical interaction or specialized hardware control.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing fixes from the provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f
Restart Required: Yes
Instructions:
1. Update to a patched kernel version from your distribution. 2. Rebuild kernel if compiling from source with the fix commits. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable tc358767 module
linuxPrevent loading of the vulnerable driver if not needed
echo 'blacklist tc358767' >> /etc/modprobe.d/blacklist.conf
rmmod tc358767
Avoid hot-plugging displays
allPrevent triggering the HPD event that causes the vulnerability
🧯 If You Can't Patch
- Ensure systems don't use tc358767 bridge hardware
- Implement strict physical access controls to prevent hardware manipulation
🔍 How to Verify
Check if Vulnerable:
Check if tc358767 module is loaded: lsmod | grep tc358767. Check kernel version against affected ranges.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check dmesg for tc358767-related errors after patch.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in dmesg/syslog
- NULL pointer dereference errors mentioning tc358767 or drm_kms_helper
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("tc358767" OR "NULL pointer dereference")
🔗 References
- https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f
- https://git.kernel.org/stable/c/1fb13693953737783b424aa4712f0a27a9eaf5a8
- https://git.kernel.org/stable/c/9d567126474e68f959b2c2543c375f3bb32e948a
- https://git.kernel.org/stable/c/adc5674c23b8191e596ed0dbaa9600265ac896a8
- https://git.kernel.org/stable/c/e1b121f21bbc56a6ae035aa5b77daac62bfb9be5
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html