Skip to main content

CVE-2024-26940: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26940cvecve-2024-26940
Published: Wed May 01 2024 (05/01/2024, 05:17:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed The driver creates /sys/kernel/debug/dri/0/mob_ttm even when the corresponding ttm_resource_manager is not allocated. This leads to a crash when trying to read from this file. Add a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file only when the corresponding ttm_resource_manager is allocated. crash> bt PID: 3133409 TASK: ffff8fe4834a5000 CPU: 3 COMMAND: "grep" #0 [ffffb954506b3b20] machine_kexec at ffffffffb2a6bec3 #1 [ffffb954506b3b78] __crash_kexec at ffffffffb2bb598a #2 [ffffb954506b3c38] crash_kexec at ffffffffb2bb68c1 #3 [ffffb954506b3c50] oops_end at ffffffffb2a2a9b1 #4 [ffffb954506b3c70] no_context at ffffffffb2a7e913 #5 [ffffb954506b3cc8] __bad_area_nosemaphore at ffffffffb2a7ec8c #6 [ffffb954506b3d10] do_page_fault at ffffffffb2a7f887 #7 [ffffb954506b3d40] page_fault at ffffffffb360116e [exception RIP: ttm_resource_manager_debug+0x11] RIP: ffffffffc04afd11 RSP: ffffb954506b3df0 RFLAGS: 00010246 RAX: ffff8fe41a6d1200 RBX: 0000000000000000 RCX: 0000000000000940 RDX: 0000000000000000 RSI: ffffffffc04b4338 RDI: 0000000000000000 RBP: ffffb954506b3e08 R8: ffff8fee3ffad000 R9: 0000000000000000 R10: ffff8fe41a76a000 R11: 0000000000000001 R12: 00000000ffffffff R13: 0000000000000001 R14: ffff8fe5bb6f3900 R15: ffff8fe41a6d1200 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 #8 [ffffb954506b3e00] ttm_resource_manager_show at ffffffffc04afde7 [ttm] #9 [ffffb954506b3e30] seq_read at ffffffffb2d8f9f3 RIP: 00007f4c4eda8985 RSP: 00007ffdbba9e9f8 RFLAGS: 00000246 RAX: ffffffffffffffda RBX: 000000000037e000 RCX: 00007f4c4eda8985 RDX: 000000000037e000 RSI: 00007f4c41573000 RDI: 0000000000000003 RBP: 000000000037e000 R8: 0000000000000000 R9: 000000000037fe30 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c41573000 R13: 0000000000000003 R14: 00007f4c41572010 R15: 0000000000000003 ORIG_RAX: 0000000000000000 CS: 0033 SS: 002b

AI-Powered Analysis

AILast updated: 06/29/2025, 13:26:00 UTC

Technical Analysis

CVE-2024-26940 is a vulnerability identified in the Linux kernel's drm/vmwgfx driver, which is responsible for managing graphics resources for VMware virtual GPU devices. The issue arises because the driver creates debugfs entries (/sys/kernel/debug/dri/0/mob_ttm) even when the corresponding ttm_resource_manager is not allocated. This improper creation leads to a kernel crash when a user or process attempts to read from these debugfs files. The root cause is the lack of a conditional check before creating debugfs entries for mob_ttm, system_mob_ttm, and gmr_ttm resources. When these resources are unallocated, accessing their debugfs entries results in a null pointer dereference or invalid memory access, causing a kernel oops and system crash. The provided stack trace shows the crash occurs in the ttm_resource_manager_debug function during a page fault triggered by reading the debugfs file. This vulnerability affects specific Linux kernel versions identified by commit hashes (af4a25bbe5e7e60ff696ef5c1ec48ab2d51c17c6). The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low complexity (AC:L), needs privileges (PR:L), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet. The fix involves adding checks to ensure debugfs entries are created only when the corresponding ttm_resource_manager is allocated, preventing invalid memory access and system crashes.

Potential Impact

For European organizations, this vulnerability primarily threatens system availability on Linux hosts running VMware virtual GPU drivers with the affected kernel versions. Systems could experience unexpected kernel panics or crashes when debugfs files are accessed, potentially leading to denial of service conditions. This can disrupt services relying on virtualized Linux environments, including cloud infrastructure, development platforms, and container hosts. Since the attack requires local privileges, the risk is higher in multi-tenant or shared environments where untrusted users or processes might trigger the crash. The impact on confidentiality and integrity is negligible, but availability degradation can affect operational continuity, especially in critical infrastructure, research institutions, and enterprises heavily dependent on Linux virtualization. The vulnerability may also complicate debugging or monitoring activities that rely on debugfs, potentially delaying incident response or system diagnostics.

Mitigation Recommendations

European organizations should promptly apply the Linux kernel patches that address CVE-2024-26940 once available from their Linux distribution vendors or kernel maintainers. Until patched, restrict access to /sys/kernel/debug/dri/0/mob_ttm and related debugfs entries by limiting permissions to trusted administrators only. Disable or restrict debugfs mounting on production systems where possible to reduce exposure. Implement strict access controls and monitoring on systems running VMware virtual GPU drivers to detect unusual attempts to read debugfs files. For environments using virtualization, ensure that guest users do not have unnecessary privileges that could allow them to trigger this vulnerability. Regularly audit kernel versions and driver modules to identify and remediate vulnerable instances. Additionally, consider deploying kernel live patching solutions if available to minimize downtime during patch application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.197Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2ec8

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:26:00 PM

Last updated: 8/18/2025, 6:28:01 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats