CVE-2024-41092: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers CI has been sporadically reporting the following issue triggered by igt@i915_selftest@live@hangcheck on ADL-P and similar machines: <6> [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence ... <6> [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled <6> [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled <3> [414.070354] Unable to pin Y-tiled fence; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cut here ]------------ <2>[ 609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4>[ 609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023 <4>[ 609.604010] Workqueue: i915 __i915_gem_free_work [i915] <4>[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Call Trace: <4>[ 609.604273] <TASK> ... <4>[ 609.604716] __i915_vma_evict+0x2e9/0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] i915_vma_destroy+0x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440] process_scheduled_works+0x351/0x690 ... In the past, there were similar failures reported by CI from other IGT tests, observed on other platforms. Before commit 63baf4f3d587 ("drm/i915/gt: Only wait for GPU activity before unbinding a GGTT fence"), i915_vma_revoke_fence() was waiting for idleness of vma->active via fence_update(). That commit introduced vma->fence->active in order for the fence_update() to be able to wait selectively on that one instead of vma->active since only idleness of fence registers was needed. But then, another commit 0d86ee35097a ("drm/i915/gt: Make fence revocation unequivocal") replaced the call to fence_update() in i915_vma_revoke_fence() with only fence_write(), and also added that GEM_BUG_ON(!i915_active_is_idle(&fence->active)) in front. No justification was provided on why we might then expect idleness of vma->fence->active without first waiting on it. The issue can be potentially caused by a race among revocation of fence registers on one side and sequential execution of signal callbacks invoked on completion of a request that was using them on the other, still processed in parallel to revocation of those fence registers. Fix it by waiting for idleness of vma->fence->active in i915_vma_revoke_fence(). (cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)
AI Analysis
Technical Summary
CVE-2024-41092 is a use-after-free (UAF) vulnerability in the Linux kernel's Intel i915 graphics driver, specifically within the Direct Rendering Manager (DRM) component handling GPU fence registers. The flaw arises in the function i915_vma_revoke_fence(), which is responsible for revoking fence registers associated with GPU virtual memory areas (VMAs). The vulnerability is caused by a race condition between revocation of fence registers and the asynchronous execution of signal callbacks triggered upon completion of GPU requests that use these fences. This race can lead to the kernel attempting to access or manipulate fence objects that have already been freed, resulting in a use-after-free scenario. The issue was introduced due to a change in the kernel where the function stopped waiting for the fence's active state to become idle before revocation, relying instead on fence_write() without proper synchronization. This leads to kernel crashes (BUGs) and invalid opcode exceptions, as observed in continuous integration (CI) test failures on Intel Alder Lake platforms and similar hardware. The fix involves reintroducing a wait for the fence's active state to become idle before revocation, ensuring safe fence handling and preventing use-after-free conditions. This vulnerability affects Linux kernel versions containing the problematic commit 0d86ee35097a and related builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected i915 driver versions on Intel Alder Lake and similar platforms. The impact includes potential kernel crashes leading to system instability or denial of service (DoS). In environments where Linux is used for critical infrastructure, servers, or workstations with Intel integrated graphics, this could disrupt operations, cause data loss, or require unscheduled downtime for patching and recovery. Although the vulnerability does not directly enable privilege escalation or remote code execution, the kernel panic and system instability could be leveraged by attackers to cause persistent DoS conditions or to facilitate further attacks in complex threat scenarios. Organizations relying on Linux-based desktop or server systems with Intel graphics in sectors such as finance, manufacturing, research, and government could be affected. The lack of known exploits reduces immediate risk, but the presence of a kernel-level UAF vulnerability necessitates prompt attention to avoid exploitation as attackers develop techniques targeting this flaw.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-41092. This involves applying the patch that waits for the fence's active state to become idle before revocation in the i915 driver. System administrators should monitor vendor advisories and Linux distribution security updates for patched kernel releases. For environments where immediate patching is not feasible, organizations can consider temporarily disabling or limiting the use of Intel integrated graphics features that rely on the affected fence handling, if operationally acceptable. Additionally, enabling kernel lockdown features and restricting unprivileged access to GPU interfaces can reduce attack surface. Continuous monitoring of system logs for i915-related kernel errors or crashes can help detect exploitation attempts or instability. Testing patches in staging environments before deployment is recommended to ensure compatibility and stability. Finally, maintaining robust backup and recovery procedures will mitigate impact from potential system crashes caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-41092: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers CI has been sporadically reporting the following issue triggered by igt@i915_selftest@live@hangcheck on ADL-P and similar machines: <6> [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence ... <6> [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled <6> [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled <3> [414.070354] Unable to pin Y-tiled fence; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cut here ]------------ <2>[ 609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4>[ 609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023 <4>[ 609.604010] Workqueue: i915 __i915_gem_free_work [i915] <4>[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Call Trace: <4>[ 609.604273] <TASK> ... <4>[ 609.604716] __i915_vma_evict+0x2e9/0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] i915_vma_destroy+0x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440] process_scheduled_works+0x351/0x690 ... In the past, there were similar failures reported by CI from other IGT tests, observed on other platforms. Before commit 63baf4f3d587 ("drm/i915/gt: Only wait for GPU activity before unbinding a GGTT fence"), i915_vma_revoke_fence() was waiting for idleness of vma->active via fence_update(). That commit introduced vma->fence->active in order for the fence_update() to be able to wait selectively on that one instead of vma->active since only idleness of fence registers was needed. But then, another commit 0d86ee35097a ("drm/i915/gt: Make fence revocation unequivocal") replaced the call to fence_update() in i915_vma_revoke_fence() with only fence_write(), and also added that GEM_BUG_ON(!i915_active_is_idle(&fence->active)) in front. No justification was provided on why we might then expect idleness of vma->fence->active without first waiting on it. The issue can be potentially caused by a race among revocation of fence registers on one side and sequential execution of signal callbacks invoked on completion of a request that was using them on the other, still processed in parallel to revocation of those fence registers. Fix it by waiting for idleness of vma->fence->active in i915_vma_revoke_fence(). (cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)
AI-Powered Analysis
Technical Analysis
CVE-2024-41092 is a use-after-free (UAF) vulnerability in the Linux kernel's Intel i915 graphics driver, specifically within the Direct Rendering Manager (DRM) component handling GPU fence registers. The flaw arises in the function i915_vma_revoke_fence(), which is responsible for revoking fence registers associated with GPU virtual memory areas (VMAs). The vulnerability is caused by a race condition between revocation of fence registers and the asynchronous execution of signal callbacks triggered upon completion of GPU requests that use these fences. This race can lead to the kernel attempting to access or manipulate fence objects that have already been freed, resulting in a use-after-free scenario. The issue was introduced due to a change in the kernel where the function stopped waiting for the fence's active state to become idle before revocation, relying instead on fence_write() without proper synchronization. This leads to kernel crashes (BUGs) and invalid opcode exceptions, as observed in continuous integration (CI) test failures on Intel Alder Lake platforms and similar hardware. The fix involves reintroducing a wait for the fence's active state to become idle before revocation, ensuring safe fence handling and preventing use-after-free conditions. This vulnerability affects Linux kernel versions containing the problematic commit 0d86ee35097a and related builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected i915 driver versions on Intel Alder Lake and similar platforms. The impact includes potential kernel crashes leading to system instability or denial of service (DoS). In environments where Linux is used for critical infrastructure, servers, or workstations with Intel integrated graphics, this could disrupt operations, cause data loss, or require unscheduled downtime for patching and recovery. Although the vulnerability does not directly enable privilege escalation or remote code execution, the kernel panic and system instability could be leveraged by attackers to cause persistent DoS conditions or to facilitate further attacks in complex threat scenarios. Organizations relying on Linux-based desktop or server systems with Intel graphics in sectors such as finance, manufacturing, research, and government could be affected. The lack of known exploits reduces immediate risk, but the presence of a kernel-level UAF vulnerability necessitates prompt attention to avoid exploitation as attackers develop techniques targeting this flaw.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-41092. This involves applying the patch that waits for the fence's active state to become idle before revocation in the i915 driver. System administrators should monitor vendor advisories and Linux distribution security updates for patched kernel releases. For environments where immediate patching is not feasible, organizations can consider temporarily disabling or limiting the use of Intel integrated graphics features that rely on the affected fence handling, if operationally acceptable. Additionally, enabling kernel lockdown features and restricting unprivileged access to GPU interfaces can reduce attack surface. Continuous monitoring of system logs for i915-related kernel errors or crashes can help detect exploitation attempts or instability. Testing patches in staging environments before deployment is recommended to ensure compatibility and stability. Finally, maintaining robust backup and recovery procedures will mitigate impact from potential system crashes caused by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-12T12:17:45.636Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe18b4
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 4:39:29 AM
Last updated: 8/16/2025, 12:38:51 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.