Skip to main content

CVE-2024-35817: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35817cvecve-2024-35817
Published: Fri May 17 2024 (05/17/2024, 13:23:21 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag Otherwise after the GTT bo is released, the GTT and gart space is freed but amdgpu_ttm_backend_unbind will not clear the gart page table entry and leave valid mapping entry pointing to the stale system page. Then if GPU access the gart address mistakely, it will read undefined value instead page fault, harder to debug and reproduce the real issue.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:56:22 UTC

Technical Analysis

CVE-2024-35817 is a vulnerability identified in the Linux kernel's AMDGPU driver, specifically within the drm/amdgpu component responsible for managing graphics memory. The issue arises in the handling of the Graphics Translation Table (GTT) and Graphics Address Remapping Table (GART) when binding and unbinding buffer objects (BOs) in the AMDGPU TTM (Translation Table Maps) memory manager. The vulnerability occurs because after a GTT buffer object is released, the GTT and GART space are freed, but the function amdgpu_ttm_backend_unbind fails to clear the corresponding GART page table entry. This results in a stale valid mapping entry that points to a system page that is no longer valid. Consequently, if the GPU attempts to access this GART address, it may read undefined or stale data instead of triggering a page fault. This behavior complicates debugging and reproducing the issue, as the GPU does not fail gracefully but instead reads potentially corrupted or unintended data. The vulnerability affects certain versions of the Linux kernel containing the AMDGPU driver, as indicated by the commit hashes listed. Although no known exploits are reported in the wild, the flaw could lead to subtle data integrity issues or unpredictable GPU behavior. The vulnerability does not appear to allow direct privilege escalation or remote code execution but could impact the integrity of GPU memory operations and potentially lead to system instability or data corruption in GPU-accelerated applications. The lack of a CVSS score suggests this is a recently disclosed issue, and the patch or fix is expected to clear the stale GART entries properly to prevent the GPU from accessing invalid memory regions.

Potential Impact

For European organizations, the impact of CVE-2024-35817 primarily concerns systems running Linux with AMD GPUs, especially in environments relying on GPU acceleration for workloads such as scientific computing, media processing, virtualization, or cloud services. The vulnerability could lead to data integrity issues where GPU computations might read stale or undefined data, potentially causing incorrect processing results or application crashes. In critical infrastructure sectors or industries where GPU-accelerated computations are integral (e.g., automotive, aerospace, finance, research institutions), this could translate into operational disruptions or erroneous outputs. While the vulnerability does not directly expose confidentiality or enable remote exploitation, the subtle nature of the bug makes detection and debugging difficult, increasing the risk of prolonged exposure. Furthermore, organizations using Linux-based virtualized environments or containers with AMD GPU passthrough might experience stability issues or data corruption, impacting service availability. Given the widespread use of Linux in European data centers, research labs, and enterprises, unpatched systems could face reliability challenges. However, the absence of known active exploits and the requirement for local GPU access limit the immediate threat scope. Still, the vulnerability underscores the importance of maintaining up-to-date kernel versions to ensure system integrity and reliability in GPU-dependent operations.

Mitigation Recommendations

To mitigate CVE-2024-35817, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for this vulnerability as soon as they become available, ensuring the amdgpu driver properly clears GART page table entries upon buffer object unbinding. 2) Conduct an inventory of systems using AMD GPUs with Linux kernels potentially affected by this issue, prioritizing critical infrastructure and GPU-accelerated workloads. 3) Implement monitoring for GPU-related errors or anomalies in applications that heavily rely on GPU memory management, as these could indicate exploitation or manifestation of the bug. 4) For virtualized environments using AMD GPU passthrough, validate the stability and correctness of GPU operations post-patching. 5) Engage with hardware and software vendors to confirm compatibility and support for updated kernel versions. 6) Where feasible, restrict access to GPU resources to trusted users and processes to minimize the risk of local exploitation. 7) Incorporate this vulnerability into vulnerability management and patching cycles, emphasizing kernel and driver updates. 8) Consider additional testing in staging environments to detect any side effects of the patch on GPU workloads before wide deployment. These steps go beyond generic advice by focusing on GPU-specific operational contexts and emphasizing proactive monitoring and validation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T12:19:12.343Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebfd8

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:56:22 AM

Last updated: 8/8/2025, 12:47:59 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats