CVE-2024-26914: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix incorrect mpc_combine array size [why] MAX_SURFACES is per stream, while MAX_PLANES is per asic. The mpc_combine is an array that records all the planes per asic. Therefore MAX_PLANES should be used as the array size. Using MAX_SURFACES causes array overflow when there are more than 3 planes. [how] Use the MAX_PLANES for the mpc_combine array size.
AI Analysis
Technical Summary
CVE-2024-26914 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the AMD display driver code. The issue arises from an incorrect array size allocation for the mpc_combine array, which is used to record all the planes per ASIC (Application-Specific Integrated Circuit). The vulnerability is due to the use of MAX_SURFACES, which is defined per stream, instead of MAX_PLANES, which is defined per ASIC, as the array size. This mismatch causes an array overflow when the number of planes exceeds three. An array overflow can lead to memory corruption, potentially allowing an attacker to manipulate kernel memory, cause system instability, or execute arbitrary code with kernel privileges. The fix involves correcting the array size to use MAX_PLANES, preventing the overflow condition. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and was published on April 17, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running Linux kernels with AMD graphics hardware that utilize the DRM subsystem. The potential impact includes unauthorized kernel-level code execution, leading to full system compromise, data breaches, or denial of service due to system crashes. Organizations relying on Linux servers, workstations, or embedded systems with AMD GPUs could be affected, particularly in sectors such as finance, government, research, and critical infrastructure where Linux is prevalent. The vulnerability could be exploited locally or potentially remotely if combined with other vulnerabilities or misconfigurations. Given the kernel-level impact, exploitation could undermine confidentiality, integrity, and availability of affected systems, potentially disrupting business operations and exposing sensitive data.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2024-26914. Since the vulnerability is in the AMD DRM driver, organizations should audit their systems to identify those with AMD graphics hardware and ensure they are running patched kernel versions. Where immediate patching is not feasible, organizations can mitigate risk by restricting access to affected systems, especially limiting local user privileges to prevent exploitation. Additionally, monitoring kernel logs for unusual behavior related to the DRM subsystem and implementing strict kernel module loading policies can help detect or prevent exploitation attempts. Organizations should also maintain robust backup and recovery procedures to minimize impact in case of exploitation. Coordination with Linux distribution vendors for timely updates and applying security advisories is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-26914: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix incorrect mpc_combine array size [why] MAX_SURFACES is per stream, while MAX_PLANES is per asic. The mpc_combine is an array that records all the planes per asic. Therefore MAX_PLANES should be used as the array size. Using MAX_SURFACES causes array overflow when there are more than 3 planes. [how] Use the MAX_PLANES for the mpc_combine array size.
AI-Powered Analysis
Technical Analysis
CVE-2024-26914 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the AMD display driver code. The issue arises from an incorrect array size allocation for the mpc_combine array, which is used to record all the planes per ASIC (Application-Specific Integrated Circuit). The vulnerability is due to the use of MAX_SURFACES, which is defined per stream, instead of MAX_PLANES, which is defined per ASIC, as the array size. This mismatch causes an array overflow when the number of planes exceeds three. An array overflow can lead to memory corruption, potentially allowing an attacker to manipulate kernel memory, cause system instability, or execute arbitrary code with kernel privileges. The fix involves correcting the array size to use MAX_PLANES, preventing the overflow condition. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and was published on April 17, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to systems running Linux kernels with AMD graphics hardware that utilize the DRM subsystem. The potential impact includes unauthorized kernel-level code execution, leading to full system compromise, data breaches, or denial of service due to system crashes. Organizations relying on Linux servers, workstations, or embedded systems with AMD GPUs could be affected, particularly in sectors such as finance, government, research, and critical infrastructure where Linux is prevalent. The vulnerability could be exploited locally or potentially remotely if combined with other vulnerabilities or misconfigurations. Given the kernel-level impact, exploitation could undermine confidentiality, integrity, and availability of affected systems, potentially disrupting business operations and exposing sensitive data.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2024-26914. Since the vulnerability is in the AMD DRM driver, organizations should audit their systems to identify those with AMD graphics hardware and ensure they are running patched kernel versions. Where immediate patching is not feasible, organizations can mitigate risk by restricting access to affected systems, especially limiting local user privileges to prevent exploitation. Additionally, monitoring kernel logs for unusual behavior related to the DRM subsystem and implementing strict kernel module loading policies can help detect or prevent exploitation attempts. Organizations should also maintain robust backup and recovery procedures to minimize impact in case of exploitation. Coordination with Linux distribution vendors for timely updates and applying security advisories is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.193Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3f2e
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:11:31 PM
Last updated: 8/2/2025, 4:49:47 AM
Views: 13
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.