Skip to main content

CVE-2024-36022: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36022cvecve-2024-36022
Published: Thu May 30 2024 (05/30/2024, 15:03:59 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload In passthrough environment, when amdgpu is reloaded after unload, mode-1 is triggered after initializing the necessary IPs, That init does not include KFD, and KFD init waits until the reset is completed. KFD init is called in the reset handler, but in this case, the zone device and drm client is not initialized, causing app to create kernel panic. v2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create. As the previous version has the potential of creating DRM client twice. v3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA before SDMA init. Adding the condition to in drm client creation, on top of v1, to guard against drm client creation call multiple times.

AI-Powered Analysis

AILast updated: 06/29/2025, 09:26:21 UTC

Technical Analysis

CVE-2024-36022 is a vulnerability identified in the Linux kernel specifically affecting the AMD GPU driver (amdgpu) subsystem. The issue arises in passthrough environments where the amdgpu driver is reloaded after being unloaded. During this reload process, a mode-1 reset is triggered after initializing necessary IP components; however, the initialization sequence does not include the Kernel Fusion Driver (KFD). The KFD initialization is deferred until the reset completes, but in this scenario, the zone device and DRM client are not properly initialized before the KFD init is called in the reset handler. This improper initialization sequence can cause the application to trigger a kernel panic, effectively causing a system crash. The vulnerability went through multiple patch iterations: the second version removed the KFD initialization condition from the drm client creation function to avoid creating the DRM client twice, but this introduced a new issue where the SDMA engine could hang due to VM clearing before SDMA initialization. The third patch added a guard condition to prevent multiple DRM client creation calls, resolving the SDMA hang while maintaining proper initialization order. This vulnerability is rooted in race conditions and improper sequencing in the driver’s reset and initialization logic, which can lead to system instability and denial of service via kernel panic. No known exploits are currently reported in the wild, and the vulnerability affects specific Linux kernel versions identified by commit hashes.

Potential Impact

For European organizations relying on Linux systems with AMD GPU hardware, particularly in virtualization or passthrough environments (e.g., cloud providers, data centers, research institutions), this vulnerability poses a risk of system crashes leading to denial of service. Kernel panics can disrupt critical services, cause data loss, and require system reboots, impacting availability and operational continuity. Organizations using AMD GPUs in high-performance computing, graphical workloads, or virtualized environments may experience instability or downtime if the vulnerable driver version is in use. Although no direct confidentiality or integrity compromise is indicated, the availability impact can be significant, especially for environments requiring high uptime or real-time processing. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits targeting this vulnerability to cause disruptions. The complexity of the issue and its presence in kernel-level code means that remediation requires careful patching and testing to avoid introducing regressions or new issues.

Mitigation Recommendations

1. Apply the latest Linux kernel updates that include the patches for CVE-2024-36022 as soon as they are available from trusted sources or Linux distributions. 2. For environments using AMD GPU passthrough, validate that the kernel version includes the final patch iteration that guards against multiple DRM client creations and SDMA engine hangs. 3. Test kernel updates in staging environments to ensure stability and compatibility with existing workloads, especially in virtualized or passthrough configurations. 4. Monitor system logs for kernel panics or GPU driver errors that could indicate attempts to trigger this vulnerability. 5. Where possible, limit the use of passthrough configurations or AMD GPU reloads until patched kernels are deployed. 6. Maintain robust backup and recovery procedures to mitigate the impact of unexpected system crashes. 7. Engage with Linux distribution security advisories and AMD GPU driver maintainers for ongoing updates and best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.157Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe24e3

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 9:26:21 AM

Last updated: 7/31/2025, 9:20:59 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats