Skip to main content

CVE-2024-49901: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-49901cvecve-2024-49901
Published: Mon Oct 21 2024 (10/21/2024, 18:01:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs There are some cases, such as the one uncovered by Commit 46d4efcccc68 ("drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails") where msm_gpu_cleanup() : platform_set_drvdata(gpu->pdev, NULL); is called on gpu->pdev == NULL, as the GPU device has not been fully initialized yet. Turns out that there's more than just the aforementioned path that causes this to happen (e.g. the case when there's speedbin data in the catalog, but opp-supported-hw is missing in DT). Assigning msm_gpu->pdev earlier seems like the least painful solution to this, therefore do so. Patchwork: https://patchwork.freedesktop.org/patch/602742/

AI-Powered Analysis

AILast updated: 06/28/2025, 21:25:52 UTC

Technical Analysis

CVE-2024-49901 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for Qualcomm's MSM (Mobile Station Modem) Adreno GPU driver. The issue arises due to improper initialization order of the msm_gpu->pdev pointer, which represents the platform device associated with the GPU. In certain scenarios, such as when speedbin data is present in the device catalog but the operating performance points (opp)-supported hardware entry is missing in the device tree (DT), the GPU device is not fully initialized before cleanup routines are invoked. This leads to a null pointer dereference when msm_gpu_cleanup() calls platform_set_drvdata(gpu->pdev, NULL) while gpu->pdev is still NULL. The root cause is that the assignment of msm_gpu->pdev is delayed until after some initialization steps, causing potential use of a null pointer. The patch resolves this by assigning msm_gpu->pdev earlier in the initialization sequence, thereby preventing null pointer dereferences and improving stability. Although this vulnerability primarily causes a null pointer dereference, which can lead to kernel crashes (denial of service), it does not appear to allow privilege escalation or arbitrary code execution. No known exploits are currently reported in the wild. The vulnerability affects specific Linux kernel versions containing the affected commit hashes, and the fix is available via the referenced patchwork link.

Potential Impact

For European organizations, the primary impact of CVE-2024-49901 is potential denial of service (DoS) on Linux systems running affected kernel versions with Qualcomm MSM Adreno GPU drivers. This could manifest as system crashes or instability, particularly in embedded devices, mobile platforms, or specialized hardware using these drivers. Organizations relying on Linux-based infrastructure with these GPU drivers—such as telecommunications equipment, IoT devices, or specialized computing platforms—may experience service interruptions. While the vulnerability does not currently enable code execution or data breaches, the resulting system instability could disrupt critical services or operations. In sectors like telecommunications, manufacturing, or automotive industries prevalent in Europe, such disruptions could have operational and financial consequences. However, general-purpose Linux servers or desktops without the affected GPU drivers are unlikely to be impacted. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions that include the patch assigning msm_gpu->pdev earlier in the initialization process. Specifically, they should track and apply updates from trusted Linux distributions or directly apply the patch referenced in the Patchwork link (https://patchwork.freedesktop.org/patch/602742/). For embedded or specialized devices, vendors should be contacted to provide updated firmware or kernel versions incorporating this fix. Additionally, organizations should audit their device inventory to identify systems using Qualcomm MSM Adreno GPUs with affected Linux kernel versions. Implementing monitoring to detect kernel crashes or instability related to GPU drivers can help identify exploitation attempts or accidental triggers. Where immediate patching is not feasible, isolating affected devices from critical networks or limiting their exposure can reduce risk. Finally, maintaining regular backups and recovery plans will mitigate operational impact from potential DoS events caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.026Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0938

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 9:25:52 PM

Last updated: 8/13/2025, 9:30:13 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats