CVE-2024-57926

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's MediaTek DRM driver allows local attackers to cause kernel memory corruption during system shutdown. This affects systems using MediaTek graphics hardware with vulnerable kernel versions. The vulnerability can lead to system crashes or potential privilege escalation.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek DRM driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek graphics hardware and the mtk-drm driver loaded. Embedded devices, smartphones, and IoT devices using MediaTek SoCs are particularly vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise, kernel panic causing system instability, or persistent denial of service.

🟠

Likely Case

System crash or kernel panic during shutdown/reboot sequences, potentially requiring physical intervention to restore functionality.

🟢

If Mitigated

Minor system instability during shutdown with no persistent effects if proper kernel hardening is in place.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring local access to exploit.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this to cause system instability or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger system shutdown/reboot. Exploitation depends on specific memory layout and timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 078b2ff7da200b7532398e668eef723ad40fb516, 36684e9d88a2e2401ae26715a2e217cb4295cea7, or 7083b93e9755d60f0c2bcaa9d064308108280534 applied

Vendor Advisory: https://git.kernel.org/stable/c/078b2ff7da200b7532398e668eef723ad40fb516

Restart Required: Yes

Instructions:

1. Update to a patched Linux kernel version from your distribution vendor. 2. For custom kernels, apply the relevant commit from kernel.org. 3. Rebuild and install the kernel. 4. Reboot the system to load the patched kernel.

🔧 Temporary Workarounds

Disable MediaTek DRM driver

Linux

Prevent loading of the vulnerable mtk-drm kernel module

echo 'blacklist mtk-drm' >> /etc/modprobe.d/blacklist.conf
rmmod mtk-drm

Disable KASAN for production

Linux

KASAN detection can be disabled, though this doesn't fix the underlying issue

Remove 'kasan' from kernel command line in bootloader configuration

🧯 If You Can't Patch

  • Restrict local user access to prevent exploitation
  • Implement strict access controls and monitor for suspicious shutdown/reboot activities

🔍 How to Verify

Check if Vulnerable:

Check if mtk-drm module is loaded: lsmod | grep mtk_drm. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than vulnerable versions. Test system shutdown to ensure no KASAN errors.

📡 Detection & Monitoring

Log Indicators:

  • KASAN use-after-free errors in kernel logs
  • drm_atomic_helper_shutdown crash reports
  • System watchdog timeouts during shutdown

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("KASAN: use-after-free" OR "drm_atomic_helper_shutdown" OR "mtk_drm_shutdown")

🔗 References

📤 Share & Export