CVE-2024-58022

5.5 MEDIUM

📋 TL;DR

This CVE fixes a NULL pointer dereference vulnerability in the TH1520 mailbox driver in the Linux kernel. The bug occurs when devm_ioremap() returns NULL instead of an error pointer, potentially causing kernel crashes or denial of service. Systems using affected Linux kernel versions with the TH1520 mailbox driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with TH1520 mailbox driver
Versions: Linux kernel versions containing the vulnerable TH1520 mailbox driver code prior to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the TH1520 mailbox driver is compiled and loaded. This is typically specific to systems using TH1520 hardware.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart the system.

🟠

Likely Case

System instability or kernel crash when the TH1520 mailbox driver attempts to access unmapped memory regions.

🟢

If Mitigated

Minor system instability that may cause service interruptions but no privilege escalation or data compromise.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access or kernel module loading.
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or through other vulnerabilities to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger the specific driver code path. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits d0f98e14c010bcf27898b635a54c1994ac4110a8 and ecbde88e544ff016fa08bbf2156dc431bb123e9b

Vendor Advisory: https://git.kernel.org/stable/c/d0f98e14c010bcf27898b635a54c1994ac4110a8

Restart Required: Yes

Instructions:

1. Update to a Linux kernel version containing the fix commits. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable TH1520 mailbox driver

linux

Prevent loading of the vulnerable driver module

echo 'blacklist th1520_mailbox' >> /etc/modprobe.d/blacklist.conf
rmmod th1520_mailbox

🧯 If You Can't Patch

  • Restrict local user access to prevent potential exploitation
  • Implement kernel module signing to prevent unauthorized driver loading

🔍 How to Verify

Check if Vulnerable:

Check if TH1520 mailbox driver is loaded: lsmod | grep th1520_mailbox. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or that TH1520 driver is not loaded if using workaround.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in kernel logs
  • System crash/reboot events

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("NULL pointer" OR "kernel panic" OR "th1520")

🔗 References

📤 Share & Export