Cyber Posture

CVE-2024-58054

High

Published: 06 March 2025

Published
06 March 2025
Modified
22 January 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2024-58054 is a vulnerability in the Linux kernel's staging/media/max96712 driver that causes a kernel oops during module removal. The issue arises because v4l2_i2c_subdev_init() calls i2c_set_clientdata(), overwriting the client data pointer to point to the subdevice structure (sd) instead of the private data (priv). Consequently, during module removal via max96712_remove(), an incorrect pointer is passed to v4l2_async_unregister_subdev(), resulting in a paging fault and kernel crash, as evidenced by the provided stack trace showing a data abort at led_put() with a invalid virtual address.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). By executing rmmod on the max96712 module—typically after it has been loaded—the attacker triggers the kernel oops, leading to a denial of service due to system instability (A:H). The CVSS v3.1 base score of 7.1 also rates confidentiality impact as high (C:H), potentially allowing memory disclosure through the crash dump, though integrity impact is none (I:N).

Mitigation involves applying upstream kernel patches, as detailed in the referenced stable commit fixes: 1556b9149b81cc549c13f5e56e81e89404d8a666, 278a98f6d8a7bbe1110433b057333536e4490edf, 3311c5395e7322298b659b8addc704b39fb3a59c, dfde3d63afbaae664c4d36e53cfb4045d5374561, and ee1b5046d5cd892a0754ab982aeaaad3702083a5. These commits resolve the pointer overwrite in the max96712 driver for affected kernel versions.

Details

CWE(s)
NVD-CWE-noinfo

Affected Products

linux
linux kernel
5.17 — 6.1.129 · 6.2 — 6.6.76 · 6.7 — 6.12.13
debian
debian linux
11.0

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability in the Linux kernel driver allows a local low-privileged attacker to trigger a kernel oops and system crash via rmmod on the max96712 module, directly enabling denial of service through exploitation of a system vulnerability.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References