Skip to main content

CVE-2024-38549: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-38549cvecve-2024-38549
Published: Wed Jun 19 2024 (06/19/2024, 13:35:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Add 0 size check to mtk_drm_gem_obj Add a check to mtk_drm_gem_init if we attempt to allocate a GEM object of 0 bytes. Currently, no such check exists and the kernel will panic if a userspace application attempts to allocate a 0x0 GBM buffer. Tested by attempting to allocate a 0x0 GBM buffer on an MT8188 and verifying that we now return EINVAL.

AI-Powered Analysis

AILast updated: 06/29/2025, 11:11:13 UTC

Technical Analysis

CVE-2024-38549 addresses a vulnerability in the Linux kernel's MediaTek DRM (Direct Rendering Manager) driver, specifically within the mtk_drm_gem_obj allocation logic. The flaw arises because the driver lacks a validation check when a userspace application attempts to allocate a Graphics Execution Manager (GEM) buffer of zero bytes (0x0). Without this check, the kernel attempts to allocate a zero-sized GEM object, which leads to a kernel panic, effectively causing a denial of service (DoS) condition. The vulnerability was identified and tested on the MediaTek MT8188 platform, where the kernel would crash upon such an allocation request. The patch introduces a validation step in the mtk_drm_gem_init function to reject zero-sized allocations by returning an EINVAL error code, preventing the kernel panic. This vulnerability is rooted in improper input validation in the DRM subsystem for MediaTek hardware within the Linux kernel. Since the flaw causes a kernel panic, it impacts system availability and stability. However, exploitation requires a userspace application to deliberately request a zero-sized GEM buffer allocation, which is not a typical operation. There is no indication of privilege escalation or confidentiality/integrity compromise. No known exploits are reported in the wild, and the vulnerability affects Linux kernel versions containing the specified commit hash. The issue is specific to MediaTek DRM drivers and does not affect all Linux kernel installations universally.

Potential Impact

For European organizations, the primary impact of CVE-2024-38549 is the potential for denial of service on systems running Linux kernels with the vulnerable MediaTek DRM driver, particularly on devices using MediaTek SoCs such as the MT8188. This could affect embedded systems, IoT devices, or specialized hardware platforms deployed in industrial, telecommunications, or consumer environments. A successful exploit would cause the kernel to panic and the system to crash, leading to downtime and potential disruption of services. While this does not directly compromise data confidentiality or integrity, availability interruptions can have operational and financial consequences, especially in critical infrastructure or service provider contexts. The requirement for a userspace application to trigger the vulnerability somewhat limits remote exploitation risks, but insider threats or malicious software could leverage this flaw to disrupt systems. European organizations relying on MediaTek-based Linux devices should assess their exposure, particularly in sectors where embedded Linux devices are prevalent. The absence of known exploits reduces immediate risk, but timely patching is recommended to prevent potential future abuse.

Mitigation Recommendations

1. Apply the official Linux kernel patches that include the fix for CVE-2024-38549 as soon as they become available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux builds with MediaTek DRM drivers, ensure the kernel source is updated and rebuilt with the fix integrated. 3. Implement application whitelisting and strict controls on userspace applications to prevent unauthorized or malicious software from attempting to allocate GEM buffers, reducing the risk of exploitation. 4. Monitor system logs for unusual DRM or GEM allocation requests that could indicate attempts to trigger the vulnerability. 5. In environments where patching is delayed, consider isolating vulnerable devices or limiting access to trusted users to reduce the attack surface. 6. Conduct regular security audits of embedded Linux devices using MediaTek hardware to verify kernel versions and patch status. 7. Engage with hardware vendors and Linux distribution maintainers to confirm the availability and deployment of patches across all affected platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.920Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe292f

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:11:13 AM

Last updated: 8/11/2025, 8:07:21 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats