CVE-2024-58004

7.8 HIGH

📋 TL;DR

This CVE-2024-58004 is a memory corruption vulnerability in the Linux kernel's Intel IPU6 media driver where CPU latency QoS requests are not properly removed on error paths, leading to list corruption. This affects Linux systems with Intel IPU6 hardware and the i915 graphics driver. The vulnerability can cause kernel panics or system instability.

💻 Affected Systems

Products:
  • Linux kernel with Intel IPU6 media driver
Versions: Linux kernel versions containing the vulnerable code (specific versions not specified in CVE, but patches available in stable branches)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel IPU6 hardware and i915 graphics driver usage; not all Linux systems are affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel crashes, or denial of service when using Intel IPU6 media functionality with i915 graphics.

🟢

If Mitigated

Limited to systems with specific Intel hardware and kernel configurations; patched systems are unaffected.

🌐 Internet-Facing: LOW - This is a kernel-level driver issue requiring local access or specific hardware interaction.
🏢 Internal Only: MEDIUM - Could affect servers or workstations with vulnerable kernel versions and Intel IPU6 hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the error path in intel_dp_aux_xfer function; likely requires local access or specific hardware conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in Linux kernel stable commits: 1496ec94bd38bdb25ca13b1dd4f8e7a6176ea89d, 95275736185ecb71dc97a71d8d9d19e4ffb0a9eb, facb541ff0805314e0b56e508f7d3cbd07af513c

Vendor Advisory: https://git.kernel.org/stable/c/1496ec94bd38bdb25ca13b1dd4f8e7a6176ea89d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check with your distribution for security updates. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable Intel IPU6 driver

Linux

Prevent loading of the vulnerable Intel IPU6 media driver module

echo 'blacklist intel_ipu6' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict access to systems with vulnerable configurations
  • Monitor for kernel panic logs and system instability

🔍 How to Verify

Check if Vulnerable:

Check if Intel IPU6 driver is loaded: lsmod | grep ipu6; check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check that the patched driver is loaded

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning 'list_add corruption'
  • Warnings about CPU latency QoS
  • Errors in intel_dp_aux_xfer function

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

Search for kernel logs containing 'list_add corruption' OR 'cpu_latency_qos' OR 'intel_dp_aux_xfer'

🔗 References

📤 Share & Export