Skip to main content

CVE-2024-35950: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35950cvecve-2024-35950
Published: Mon May 20 2024 (05/20/2024, 09:41:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mutex. Thus we need to extend modes[] the same protection or by the time we use it the elements may already be pointing to freed/reused memory.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:26:46 UTC

Technical Analysis

CVE-2024-35950 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the client code that manages display modes. The issue arises because the modes[] array, which holds pointers to display modes on connectors' mode lists, is not adequately protected by the dev->mode_config.mutex mutex. The mode lists themselves are protected by this mutex, but the modes[] array was not, leading to a race condition where the pointers in modes[] could reference memory that has already been freed or reused. This can cause use-after-free conditions, potentially leading to memory corruption, system instability, or kernel crashes. The vulnerability is rooted in improper synchronization of shared data structures in the DRM client code, which is critical for managing display configurations in Linux. The fix involves extending the protection of the modes[] array by locking it with the dev->mode_config.mutex mutex, ensuring that the pointers remain valid while in use. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and likely earlier versions that have not applied this patch. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. However, the nature of the vulnerability suggests it could be exploited locally or potentially remotely if an attacker can trigger mode changes or interact with the DRM subsystem, leading to denial of service or privilege escalation scenarios.

Potential Impact

For European organizations, the impact of CVE-2024-35950 can be significant, especially for those relying on Linux-based systems for critical infrastructure, servers, or workstations that utilize graphical interfaces or GPU acceleration. Exploitation could lead to system crashes or kernel panics, resulting in denial of service. In environments where uptime and stability are critical, such as financial institutions, healthcare providers, and government agencies, this could disrupt operations and lead to financial or reputational damage. Additionally, if combined with other vulnerabilities or misconfigurations, it might be leveraged for privilege escalation, allowing attackers to gain higher system privileges. Given the widespread use of Linux in European data centers, cloud providers, and embedded systems, the vulnerability poses a risk to a broad range of sectors. However, exploitation requires interaction with the DRM subsystem, which may limit the attack surface primarily to systems with graphical capabilities or GPU usage. Systems running headless servers without DRM components are less likely to be affected. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks once the vulnerability details become widely known.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address this vulnerability by properly locking the modes[] array with dev->mode_config.mutex. System administrators should: 1) Identify all Linux systems running affected kernel versions, particularly those with graphical interfaces or GPU usage. 2) Update the Linux kernel to the latest stable release that includes the fix for CVE-2024-35950. 3) For systems where immediate patching is not feasible, consider temporarily disabling or limiting access to DRM-related functionalities if operationally possible. 4) Monitor system logs and kernel messages for unusual behavior or crashes related to DRM components. 5) Employ strict access controls to limit local user privileges, reducing the risk of exploitation by unprivileged users. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation. 7) Engage with hardware and software vendors to confirm compatibility and support for patched kernel versions. These steps go beyond generic advice by focusing on the specific subsystem affected and the operational context of DRM usage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.134Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2259

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:26:46 AM

Last updated: 7/21/2025, 4:58:32 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats