CVE-2024-58004
📋 TL;DR
This CVE-2024-58004 is a memory corruption vulnerability in the Linux kernel's Intel IPU6 media driver where CPU latency QoS requests are not properly removed on error paths, leading to list corruption. This affects Linux systems with Intel IPU6 hardware and the i915 graphics driver. The vulnerability can cause kernel panics or system instability.
💻 Affected Systems
- Linux kernel with Intel IPU6 media driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.
Likely Case
System instability, kernel crashes, or denial of service when using Intel IPU6 media functionality with i915 graphics.
If Mitigated
Limited to systems with specific Intel hardware and kernel configurations; patched systems are unaffected.
🎯 Exploit Status
Exploitation requires triggering the error path in intel_dp_aux_xfer function; likely requires local access or specific hardware conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in Linux kernel stable commits: 1496ec94bd38bdb25ca13b1dd4f8e7a6176ea89d, 95275736185ecb71dc97a71d8d9d19e4ffb0a9eb, facb541ff0805314e0b56e508f7d3cbd07af513c
Vendor Advisory: https://git.kernel.org/stable/c/1496ec94bd38bdb25ca13b1dd4f8e7a6176ea89d
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check with your distribution for security updates. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable Intel IPU6 driver
LinuxPrevent loading of the vulnerable Intel IPU6 media driver module
echo 'blacklist intel_ipu6' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict access to systems with vulnerable configurations
- Monitor for kernel panic logs and system instability
🔍 How to Verify
Check if Vulnerable:
Check if Intel IPU6 driver is loaded: lsmod | grep ipu6; check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or check that the patched driver is loaded
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning 'list_add corruption'
- Warnings about CPU latency QoS
- Errors in intel_dp_aux_xfer function
Network Indicators:
- None - this is a local kernel vulnerability
SIEM Query:
Search for kernel logs containing 'list_add corruption' OR 'cpu_latency_qos' OR 'intel_dp_aux_xfer'