Skip to main content

CVE-2024-26914: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26914cvecve-2024-26914
Published: Wed Apr 17 2024 (04/17/2024, 15:59:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix incorrect mpc_combine array size [why] MAX_SURFACES is per stream, while MAX_PLANES is per asic. The mpc_combine is an array that records all the planes per asic. Therefore MAX_PLANES should be used as the array size. Using MAX_SURFACES causes array overflow when there are more than 3 planes. [how] Use the MAX_PLANES for the mpc_combine array size.

AI-Powered Analysis

AILast updated: 06/29/2025, 20:11:31 UTC

Technical Analysis

CVE-2024-26914 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the AMD display driver code. The issue arises from an incorrect array size allocation for the mpc_combine array, which is used to record all the planes per ASIC (Application-Specific Integrated Circuit). The vulnerability is due to the use of MAX_SURFACES, which is defined per stream, instead of MAX_PLANES, which is defined per ASIC, as the array size. This mismatch causes an array overflow when the number of planes exceeds three. An array overflow can lead to memory corruption, potentially allowing an attacker to manipulate kernel memory, cause system instability, or execute arbitrary code with kernel privileges. The fix involves correcting the array size to use MAX_PLANES, preventing the overflow condition. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and was published on April 17, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to systems running Linux kernels with AMD graphics hardware that utilize the DRM subsystem. The potential impact includes unauthorized kernel-level code execution, leading to full system compromise, data breaches, or denial of service due to system crashes. Organizations relying on Linux servers, workstations, or embedded systems with AMD GPUs could be affected, particularly in sectors such as finance, government, research, and critical infrastructure where Linux is prevalent. The vulnerability could be exploited locally or potentially remotely if combined with other vulnerabilities or misconfigurations. Given the kernel-level impact, exploitation could undermine confidentiality, integrity, and availability of affected systems, potentially disrupting business operations and exposing sensitive data.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2024-26914. Since the vulnerability is in the AMD DRM driver, organizations should audit their systems to identify those with AMD graphics hardware and ensure they are running patched kernel versions. Where immediate patching is not feasible, organizations can mitigate risk by restricting access to affected systems, especially limiting local user privileges to prevent exploitation. Additionally, monitoring kernel logs for unusual behavior related to the DRM subsystem and implementing strict kernel module loading policies can help detect or prevent exploitation attempts. Organizations should also maintain robust backup and recovery procedures to minimize impact in case of exploitation. Coordination with Linux distribution vendors for timely updates and applying security advisories is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.193Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3f2e

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:11:31 PM

Last updated: 8/2/2025, 4:49:47 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats