Skip to main content

CVE-2024-36897: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-36897cvecve-2024-36897
Published: Thu May 30 2024 (05/30/2024, 15:29:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 New request from KMD/VBIOS in order to support new UMA carveout model. This fixes a null dereference from accessing Ctx->dc_bios->integrated_info while it was NULL. DAL parses through the BIOS and extracts the necessary integrated_info but was missing a case for the new BIOS version 2.3.

AI-Powered Analysis

AILast updated: 06/29/2025, 09:56:23 UTC

Technical Analysis

CVE-2024-36897 is a medium-severity vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The flaw resides in the drm/amd/display driver component, related to the Atom Integrated System Info version 2_2 for DCN35. The vulnerability arises due to improper handling of a new UMA (Unified Memory Architecture) carveout model requested by Kernel Mode Driver (KMD) or Video BIOS (VBIOS). The DAL (Display Abstraction Layer) component parses BIOS data to extract integrated system information, but it lacked support for BIOS version 2.3. This omission leads to a null pointer dereference when accessing the pointer Ctx->dc_bios->integrated_info, which can be NULL under the new BIOS version. This null dereference can cause a denial of service (DoS) by crashing the kernel or causing instability in the graphics subsystem. The vulnerability requires local privileges (low privileges) and does not require user interaction, but it does require some level of privilege (PR:L). The CVSS 3.1 score is 5.5, reflecting a medium severity with an attack vector limited to local access, low complexity, and no confidentiality or integrity impact but a high impact on availability. No known exploits are currently reported in the wild. The root cause is classified under CWE-476 (NULL Pointer Dereference). The vulnerability is fixed by adding support for the new BIOS version 2.3 in the DAL parsing logic, preventing the null dereference. This issue affects Linux kernel versions identified by the given commit hashes, which correspond to recent kernel builds incorporating the AMD display driver code. Overall, this vulnerability is a stability and availability risk for systems running affected Linux kernels with AMD integrated graphics hardware using the Atom Integrated System Info BIOS interface version 2.3 or later.

Potential Impact

For European organizations, the primary impact of CVE-2024-36897 is potential denial of service on Linux systems using AMD integrated graphics with the affected kernel versions. This could lead to system crashes or graphical subsystem failures, disrupting business operations, especially in environments relying on Linux workstations or servers with AMD graphics hardware. Industries with high reliance on Linux for desktop or specialized computing (e.g., engineering, scientific research, media production) may experience productivity losses. While the vulnerability does not compromise confidentiality or integrity, availability impacts could affect critical services or user workflows. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. European organizations with large Linux deployments, particularly those using AMD hardware, should be aware of this risk. The lack of known exploits reduces immediate threat but patching is recommended to prevent future exploitation and maintain system stability.

Mitigation Recommendations

To mitigate CVE-2024-36897, European organizations should: 1) Identify Linux systems running AMD integrated graphics and verify kernel versions against the affected commits. 2) Apply the latest Linux kernel updates or patches that include the fix for BIOS version 2.3 support in the AMD DRM driver. 3) For environments where immediate patching is not feasible, consider restricting local user privileges to trusted personnel only, minimizing the risk of local exploitation. 4) Monitor system logs and kernel crash reports for signs of null pointer dereference or graphics subsystem instability. 5) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and advisories are received. 6) Implement strict access controls and endpoint security to prevent unauthorized local access that could trigger the vulnerability. 7) Test updates in staging environments to confirm stability before wide deployment, especially in critical infrastructure or production systems. These steps go beyond generic advice by focusing on hardware-specific identification, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.066Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe25ef

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 9:56:23 AM

Last updated: 7/30/2025, 9:37:53 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats