CVE-2024-36897: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 New request from KMD/VBIOS in order to support new UMA carveout model. This fixes a null dereference from accessing Ctx->dc_bios->integrated_info while it was NULL. DAL parses through the BIOS and extracts the necessary integrated_info but was missing a case for the new BIOS version 2.3.
AI Analysis
Technical Summary
CVE-2024-36897 is a medium-severity vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The flaw resides in the drm/amd/display driver component, related to the Atom Integrated System Info version 2_2 for DCN35. The vulnerability arises due to improper handling of a new UMA (Unified Memory Architecture) carveout model requested by Kernel Mode Driver (KMD) or Video BIOS (VBIOS). The DAL (Display Abstraction Layer) component parses BIOS data to extract integrated system information, but it lacked support for BIOS version 2.3. This omission leads to a null pointer dereference when accessing the pointer Ctx->dc_bios->integrated_info, which can be NULL under the new BIOS version. This null dereference can cause a denial of service (DoS) by crashing the kernel or causing instability in the graphics subsystem. The vulnerability requires local privileges (low privileges) and does not require user interaction, but it does require some level of privilege (PR:L). The CVSS 3.1 score is 5.5, reflecting a medium severity with an attack vector limited to local access, low complexity, and no confidentiality or integrity impact but a high impact on availability. No known exploits are currently reported in the wild. The root cause is classified under CWE-476 (NULL Pointer Dereference). The vulnerability is fixed by adding support for the new BIOS version 2.3 in the DAL parsing logic, preventing the null dereference. This issue affects Linux kernel versions identified by the given commit hashes, which correspond to recent kernel builds incorporating the AMD display driver code. Overall, this vulnerability is a stability and availability risk for systems running affected Linux kernels with AMD integrated graphics hardware using the Atom Integrated System Info BIOS interface version 2.3 or later.
Potential Impact
For European organizations, the primary impact of CVE-2024-36897 is potential denial of service on Linux systems using AMD integrated graphics with the affected kernel versions. This could lead to system crashes or graphical subsystem failures, disrupting business operations, especially in environments relying on Linux workstations or servers with AMD graphics hardware. Industries with high reliance on Linux for desktop or specialized computing (e.g., engineering, scientific research, media production) may experience productivity losses. While the vulnerability does not compromise confidentiality or integrity, availability impacts could affect critical services or user workflows. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. European organizations with large Linux deployments, particularly those using AMD hardware, should be aware of this risk. The lack of known exploits reduces immediate threat but patching is recommended to prevent future exploitation and maintain system stability.
Mitigation Recommendations
To mitigate CVE-2024-36897, European organizations should: 1) Identify Linux systems running AMD integrated graphics and verify kernel versions against the affected commits. 2) Apply the latest Linux kernel updates or patches that include the fix for BIOS version 2.3 support in the AMD DRM driver. 3) For environments where immediate patching is not feasible, consider restricting local user privileges to trusted personnel only, minimizing the risk of local exploitation. 4) Monitor system logs and kernel crash reports for signs of null pointer dereference or graphics subsystem instability. 5) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and advisories are received. 6) Implement strict access controls and endpoint security to prevent unauthorized local access that could trigger the vulnerability. 7) Test updates in staging environments to confirm stability before wide deployment, especially in critical infrastructure or production systems. These steps go beyond generic advice by focusing on hardware-specific identification, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-36897: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 New request from KMD/VBIOS in order to support new UMA carveout model. This fixes a null dereference from accessing Ctx->dc_bios->integrated_info while it was NULL. DAL parses through the BIOS and extracts the necessary integrated_info but was missing a case for the new BIOS version 2.3.
AI-Powered Analysis
Technical Analysis
CVE-2024-36897 is a medium-severity vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The flaw resides in the drm/amd/display driver component, related to the Atom Integrated System Info version 2_2 for DCN35. The vulnerability arises due to improper handling of a new UMA (Unified Memory Architecture) carveout model requested by Kernel Mode Driver (KMD) or Video BIOS (VBIOS). The DAL (Display Abstraction Layer) component parses BIOS data to extract integrated system information, but it lacked support for BIOS version 2.3. This omission leads to a null pointer dereference when accessing the pointer Ctx->dc_bios->integrated_info, which can be NULL under the new BIOS version. This null dereference can cause a denial of service (DoS) by crashing the kernel or causing instability in the graphics subsystem. The vulnerability requires local privileges (low privileges) and does not require user interaction, but it does require some level of privilege (PR:L). The CVSS 3.1 score is 5.5, reflecting a medium severity with an attack vector limited to local access, low complexity, and no confidentiality or integrity impact but a high impact on availability. No known exploits are currently reported in the wild. The root cause is classified under CWE-476 (NULL Pointer Dereference). The vulnerability is fixed by adding support for the new BIOS version 2.3 in the DAL parsing logic, preventing the null dereference. This issue affects Linux kernel versions identified by the given commit hashes, which correspond to recent kernel builds incorporating the AMD display driver code. Overall, this vulnerability is a stability and availability risk for systems running affected Linux kernels with AMD integrated graphics hardware using the Atom Integrated System Info BIOS interface version 2.3 or later.
Potential Impact
For European organizations, the primary impact of CVE-2024-36897 is potential denial of service on Linux systems using AMD integrated graphics with the affected kernel versions. This could lead to system crashes or graphical subsystem failures, disrupting business operations, especially in environments relying on Linux workstations or servers with AMD graphics hardware. Industries with high reliance on Linux for desktop or specialized computing (e.g., engineering, scientific research, media production) may experience productivity losses. While the vulnerability does not compromise confidentiality or integrity, availability impacts could affect critical services or user workflows. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. European organizations with large Linux deployments, particularly those using AMD hardware, should be aware of this risk. The lack of known exploits reduces immediate threat but patching is recommended to prevent future exploitation and maintain system stability.
Mitigation Recommendations
To mitigate CVE-2024-36897, European organizations should: 1) Identify Linux systems running AMD integrated graphics and verify kernel versions against the affected commits. 2) Apply the latest Linux kernel updates or patches that include the fix for BIOS version 2.3 support in the AMD DRM driver. 3) For environments where immediate patching is not feasible, consider restricting local user privileges to trusted personnel only, minimizing the risk of local exploitation. 4) Monitor system logs and kernel crash reports for signs of null pointer dereference or graphics subsystem instability. 5) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and advisories are received. 6) Implement strict access controls and endpoint security to prevent unauthorized local access that could trigger the vulnerability. 7) Test updates in staging environments to confirm stability before wide deployment, especially in critical infrastructure or production systems. These steps go beyond generic advice by focusing on hardware-specific identification, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-30T15:25:07.066Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe25ef
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 9:56:23 AM
Last updated: 7/30/2025, 9:37:53 PM
Views: 14
Related Threats
CVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.