Skip to main content

CVE-2024-37026: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-37026cvecve-2024-37026
Published: Mon Jun 24 2024 (06/24/2024, 13:56:52 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Only use reserved BCS instances for usm migrate exec queue The GuC context scheduling queue is 2 entires deep, thus it is possible for a migration job to be stuck behind a fault if migration exec queue shares engines with user jobs. This can deadlock as the migrate exec queue is required to service page faults. Avoid deadlock by only using reserved BCS instances for usm migrate exec queue. (cherry picked from commit 04f4a70a183a688a60fe3882d6e4236ea02cfc67)

AI-Powered Analysis

AILast updated: 06/29/2025, 10:56:23 UTC

Technical Analysis

CVE-2024-37026 is a vulnerability identified in the Linux kernel specifically related to the Direct Rendering Manager (DRM) subsystem's Xe graphics driver. The issue arises from the handling of the GuC context scheduling queue, which is limited to two entries. The vulnerability occurs when a migration job, which is responsible for moving user-space memory (USM) across execution queues, becomes stuck behind a fault due to sharing engines with user jobs on the migration execution queue. This situation can lead to a deadlock because the migration execution queue is essential for servicing page faults. If the migration job is blocked, page faults cannot be resolved, potentially causing the system or affected processes to hang or become unresponsive. The fix implemented involves restricting the migration execution queue to use only reserved Blitter Command Streamer (BCS) instances, which prevents the migration jobs from being blocked by user jobs and thus avoids the deadlock scenario. This vulnerability is rooted in the kernel's graphics subsystem and affects Linux kernel versions identified by the commit hash a043fbab7af54c64017269dc96f43f441ed4bcaf. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability is technical and specific to the interaction between GPU command scheduling and memory migration in the Linux kernel's DRM subsystem.

Potential Impact

For European organizations, the impact of CVE-2024-37026 can be significant, particularly for those relying on Linux-based systems with Intel Xe graphics hardware or similar configurations that utilize the affected DRM subsystem. The deadlock caused by this vulnerability can lead to system hangs or degraded performance, impacting availability of critical services, especially in environments where GPU-accelerated workloads or graphics processing are essential, such as in scientific computing, media production, or cloud infrastructure. The inability to service page faults due to the deadlock can cause application crashes or system instability, potentially leading to downtime and loss of productivity. While this vulnerability does not directly expose confidentiality or integrity risks, the availability impact can disrupt business operations and service delivery. Organizations running Linux kernels with the affected commit or versions should consider this a reliability and availability risk, particularly in production environments where uptime is critical.

Mitigation Recommendations

To mitigate CVE-2024-37026, European organizations should: 1) Apply the patch that restricts the migration execution queue to reserved BCS instances as soon as it becomes available from their Linux distribution vendors or kernel maintainers. 2) Monitor kernel updates closely and prioritize updating systems that utilize Intel Xe graphics or similar GPU configurations. 3) In environments where immediate patching is not feasible, consider isolating or limiting workloads that trigger USM migration or GPU command scheduling to reduce the risk of deadlocks. 4) Implement robust monitoring of system responsiveness and GPU-related logs to detect early signs of deadlock or performance degradation. 5) Test kernel updates in staging environments to ensure compatibility and stability before deployment in production. 6) Engage with hardware and software vendors for guidance on best practices related to GPU driver and kernel interactions to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-24T13:53:25.523Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2899

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 10:56:23 AM

Last updated: 8/6/2025, 12:52:59 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats