Skip to main content

CVE-2024-26797: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26797cvecve-2024-26797
Published: Thu Apr 04 2024 (04/04/2024, 08:20:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Prevent potential buffer overflow in map_hw_resources Adds a check in the map_hw_resources function to prevent a potential buffer overflow. The function was accessing arrays using an index that could potentially be greater than the size of the arrays, leading to a buffer overflow. Adds a check to ensure that the index is within the bounds of the arrays. If the index is out of bounds, an error message is printed and break it will continue execution with just ignoring extra data early to prevent the buffer overflow. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id' 6 <= 7 drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:81 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id' 6 <= 7

AI-Powered Analysis

AILast updated: 07/03/2025, 01:55:02 UTC

Technical Analysis

CVE-2024-26797 is a high-severity vulnerability identified in the Linux kernel, specifically within the AMD GPU driver code under the Direct Rendering Manager (DRM) subsystem. The vulnerability arises in the map_hw_resources function, which is responsible for mapping hardware resources related to AMD display components. The root cause is a lack of proper bounds checking on array indices when accessing internal data structures, particularly those related to the dml2->v20.scratch.dml_to_dc_pipe_mapping arrays (disp_cfg_to_stream_id and disp_cfg_to_plane_id). Without adequate validation, the function could access array elements beyond their allocated size, leading to a buffer overflow condition. This buffer overflow is a classic example of CWE-120 (Buffer Copy without Checking Size of Input), which can result in memory corruption. The Linux kernel patch adds explicit checks to ensure that indices do not exceed array bounds. If an out-of-bounds index is detected, an error message is logged, and the function skips processing the extra data to prevent overflow. The vulnerability requires local access (AV:L) with low complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), as indicated by the CVSS 3.1 score of 7.8. Exploitation could allow a local attacker to execute arbitrary code within the kernel context, potentially leading to privilege escalation or system compromise. No known exploits are currently reported in the wild. The vulnerability was reported by the smatch static analysis tool and publicly disclosed on April 4, 2024.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Linux-based systems with AMD GPUs in their infrastructure. The flaw could be exploited by malicious insiders or attackers who have gained limited local access to escalate privileges to root, compromising system integrity and confidentiality. This could lead to unauthorized access to sensitive data, disruption of critical services, or deployment of persistent malware at the kernel level. Organizations running Linux servers, workstations, or embedded devices with affected AMD GPU drivers are at risk. The impact is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure, where data protection and system availability are paramount. Additionally, the vulnerability could be leveraged in multi-tenant cloud environments or virtualized infrastructures where AMD GPU passthrough is used, increasing the attack surface. Given the high severity and kernel-level impact, exploitation could undermine trust in Linux-based systems and cause operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-26797 as soon as vendor updates become available. Since the vulnerability affects the AMD GPU DRM driver, organizations should verify the kernel version and AMD GPU driver versions deployed in their environments. For environments where immediate patching is not feasible, consider restricting local access to trusted users only and enhancing monitoring for suspicious local activity. Employ kernel-level security modules such as SELinux or AppArmor to limit the potential damage from exploitation. Additionally, implement strict access controls and audit logging on systems with AMD GPUs. For cloud providers or virtualized environments, review GPU passthrough configurations and isolate workloads to minimize risk. Regularly scan systems for outdated kernels and apply security updates promptly. Finally, educate system administrators about the vulnerability and the importance of applying patches to prevent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.178Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3c32

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 7/3/2025, 1:55:02 AM

Last updated: 8/14/2025, 7:06:08 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats