Skip to main content

CVE-2024-36024: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-36024cvecve-2024-36024
Published: Thu May 30 2024 (05/30/2024, 15:04:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Disable idle reallow as part of command/gpint execution [Why] Workaroud for a race condition where DMCUB is in the process of committing to IPS1 during the handshake causing us to miss the transition into IPS2 and touch the INBOX1 RPTR causing a HW hang. [How] Disable the reallow to ensure that we have enough of a gap between entry and exit and we're not seeing back-to-back wake_and_executes.

AI-Powered Analysis

AILast updated: 06/29/2025, 09:26:49 UTC

Technical Analysis

CVE-2024-36024 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The issue arises from a race condition during the interaction between the Display Microcontroller Unit B (DMCUB) and the Integrated Power Sequencer (IPS) states, particularly during the handshake process when transitioning from IPS1 to IPS2. This race condition can cause the system to miss the transition into IPS2 and inadvertently touch the INBOX1 read pointer (RPTR), which leads to a hardware hang. The vulnerability is rooted in the timing and synchronization of power state transitions and command execution within the AMD display driver, where back-to-back wake_and_execute calls occur without sufficient delay, causing instability. The fix implemented disables the 'idle reallow' feature during command or gpint execution to ensure a sufficient gap between entry and exit points, preventing the race condition and subsequent hardware hang. This patch addresses the root cause by enforcing timing constraints that prevent overlapping power state transitions and command executions that previously led to system hangs. The vulnerability affects specific versions of the Linux kernel as indicated by the commit hashes provided, and no known exploits are currently reported in the wild. The absence of a CVSS score suggests this is a recently disclosed issue, with technical details primarily focused on hardware-level synchronization within AMD GPU drivers on Linux systems.

Potential Impact

For European organizations, the primary impact of CVE-2024-36024 is potential system instability or denial of service (DoS) due to hardware hangs on affected Linux systems running AMD graphics hardware. This can disrupt critical services, especially in environments relying on Linux servers or workstations with AMD GPUs for graphical processing or compute tasks. Industries such as media production, scientific research, and any sector utilizing GPU-accelerated computing could experience operational interruptions. While the vulnerability does not appear to allow for privilege escalation or data compromise directly, the resulting hardware hang could lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Given the Linux kernel's widespread use in European data centers, cloud infrastructure, and enterprise environments, unpatched systems could face increased risk of service disruption. However, the lack of known exploits and the technical complexity of triggering this race condition may limit immediate widespread impact. Organizations with high availability requirements or those using AMD GPUs in critical roles should prioritize mitigation to avoid unexpected outages.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Apply the official Linux kernel patches that disable the idle reallow feature during command/gpint execution as soon as they are available from trusted Linux distribution vendors or directly from the Linux kernel source. 2) Conduct thorough testing of updated kernel versions in staging environments to ensure compatibility and stability before deployment in production, especially for systems with AMD GPUs. 3) Monitor system logs and hardware status for signs of GPU-related hangs or errors that could indicate attempts to trigger this race condition. 4) For environments where immediate patching is not feasible, consider temporarily disabling or limiting GPU-intensive workloads that rely on AMD hardware to reduce the risk of triggering the vulnerability. 5) Maintain up-to-date inventory of Linux systems with AMD GPUs to prioritize patch deployment. 6) Collaborate with hardware vendors and Linux distribution maintainers for timely updates and guidance. 7) Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of hardware hangs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.158Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe24e9

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 9:26:49 AM

Last updated: 7/28/2025, 8:36:44 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats