Skip to main content

CVE-2024-49943: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49943cvecve-2024-49943
Published: Mon Oct 21 2024 (10/21/2024, 18:02:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc_submit: add missing locking in wedged_fini Any non-wedged queue can have a zero refcount here and can be running concurrently with an async queue destroy, therefore dereferencing the queue ptr to check wedge status after the lookup can trigger UAF if queue is not wedged. Fix this by keeping the submission_state lock held around the check to postpone the free and make the check safe, before dropping again around the put() to avoid the deadlock. (cherry picked from commit d28af0b6b9580b9f90c265a7da0315b0ad20bbfd)

AI-Powered Analysis

AILast updated: 06/28/2025, 21:57:22 UTC

Technical Analysis

CVE-2024-49943 is a use-after-free (UAF) vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the Intel Xe graphics driver component (drm/xe/guc_submit). The vulnerability arises due to a missing locking mechanism in the function wedged_fini, which handles the cleanup of GPU submission queues. In this scenario, a non-wedged (active) queue can have a zero reference count and may be concurrently running alongside an asynchronous queue destruction process. Because of this concurrency, the code attempts to dereference a queue pointer to check the wedge status after the lookup without holding the necessary submission_state lock. This leads to a race condition where the queue pointer could be freed by another thread, resulting in a use-after-free condition. The fix involves holding the submission_state lock around the wedge status check to postpone freeing the queue and ensure safe access, then releasing the lock appropriately to avoid deadlocks. This vulnerability is critical in the context of kernel memory management and concurrency, as exploitation could lead to kernel crashes or potentially privilege escalation if an attacker can manipulate GPU submission queues. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no known exploits are currently reported in the wild. The issue was patched by a commit that added the missing locking to prevent the unsafe dereference.

Potential Impact

For European organizations, the impact of CVE-2024-49943 can be significant, especially for those relying on Linux-based systems with Intel Xe graphics hardware, such as workstations, servers, or embedded devices used in critical infrastructure, research, or industrial environments. Exploitation of this vulnerability could lead to system instability or denial of service due to kernel crashes. More critically, if leveraged in a targeted attack, it could enable local privilege escalation, allowing attackers to gain higher-level access on affected machines. This risk is heightened in environments where multi-user access or untrusted code execution is possible, such as shared servers or cloud infrastructure. Given the Linux kernel's widespread use across European governments, enterprises, and service providers, unpatched systems could be vulnerable to disruption or compromise. However, the absence of known exploits in the wild currently reduces immediate risk, but proactive patching is essential to prevent future exploitation.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the patch for CVE-2024-49943. Specifically, they should apply the commit that adds the missing submission_state locking in the drm/xe/guc_submit driver. Kernel updates should be sourced from trusted Linux distribution vendors or directly from the Linux kernel mainline if using custom kernels. Additionally, organizations should audit systems with Intel Xe graphics hardware to identify affected machines. For environments where immediate patching is not feasible, implementing strict access controls to limit unprivileged user access and disabling unnecessary GPU acceleration features can reduce attack surface. Monitoring kernel logs for unusual GPU driver errors or crashes may help detect attempted exploitation. Finally, integrating this vulnerability into vulnerability management and patching workflows ensures timely remediation and reduces exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.044Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0abe

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 9:57:22 PM

Last updated: 8/14/2025, 1:42:09 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats