Skip to main content

CVE-2024-49989: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49989cvecve-2024-49989
Published: Mon Oct 21 2024 (10/21/2024, 18:02:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix double free issue during amdgpu module unload Flexible endpoints use DIGs from available inflexible endpoints, so only the encoders of inflexible links need to be freed. Otherwise, a double free issue may occur when unloading the amdgpu module. [ 279.190523] RIP: 0010:__slab_free+0x152/0x2f0 [ 279.190577] Call Trace: [ 279.190580] <TASK> [ 279.190582] ? show_regs+0x69/0x80 [ 279.190590] ? die+0x3b/0x90 [ 279.190595] ? do_trap+0xc8/0xe0 [ 279.190601] ? do_error_trap+0x73/0xa0 [ 279.190605] ? __slab_free+0x152/0x2f0 [ 279.190609] ? exc_invalid_op+0x56/0x70 [ 279.190616] ? __slab_free+0x152/0x2f0 [ 279.190642] ? asm_exc_invalid_op+0x1f/0x30 [ 279.190648] ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191096] ? __slab_free+0x152/0x2f0 [ 279.191102] ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191469] kfree+0x260/0x2b0 [ 279.191474] dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191821] link_destroy+0xd7/0x130 [amdgpu] [ 279.192248] dc_destruct+0x90/0x270 [amdgpu] [ 279.192666] dc_destroy+0x19/0x40 [amdgpu] [ 279.193020] amdgpu_dm_fini+0x16e/0x200 [amdgpu] [ 279.193432] dm_hw_fini+0x26/0x40 [amdgpu] [ 279.193795] amdgpu_device_fini_hw+0x24c/0x400 [amdgpu] [ 279.194108] amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu] [ 279.194436] amdgpu_pci_remove+0x40/0x80 [amdgpu] [ 279.194632] pci_device_remove+0x3a/0xa0 [ 279.194638] device_remove+0x40/0x70 [ 279.194642] device_release_driver_internal+0x1ad/0x210 [ 279.194647] driver_detach+0x4e/0xa0 [ 279.194650] bus_remove_driver+0x6f/0xf0 [ 279.194653] driver_unregister+0x33/0x60 [ 279.194657] pci_unregister_driver+0x44/0x90 [ 279.194662] amdgpu_exit+0x19/0x1f0 [amdgpu] [ 279.194939] __do_sys_delete_module.isra.0+0x198/0x2f0 [ 279.194946] __x64_sys_delete_module+0x16/0x20 [ 279.194950] do_syscall_64+0x58/0x120 [ 279.194954] entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ 279.194980] </TASK>

AI-Powered Analysis

AILast updated: 06/28/2025, 15:56:37 UTC

Technical Analysis

CVE-2024-49989 is a vulnerability identified in the Linux kernel specifically affecting the AMD GPU (amdgpu) driver module. The issue arises from a double free bug during the unloading of the amdgpu kernel module. In detail, the Linux kernel's Direct Rendering Manager (DRM) subsystem for AMD graphics cards improperly handles the freeing of encoder resources linked to display endpoints. Flexible endpoints reuse Display Interface Generators (DIGs) from inflexible endpoints, and the vulnerability stems from freeing both flexible and inflexible endpoint encoders, leading to a double free condition. This double free occurs when the amdgpu module is unloaded, causing the kernel to attempt to free the same memory region twice. The kernel logs provided indicate the fault occurs in the __slab_free function, which manages kernel memory deallocation, and the stack trace shows repeated calls to dcn10_link_encoder_destroy and related amdgpu functions. Such a double free can lead to kernel memory corruption, potentially causing system crashes (kernel panic), denial of service, or in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited with crafted inputs. However, this vulnerability requires unloading the amdgpu module, which typically requires root privileges, and no public exploits are currently known. The vulnerability affects specific Linux kernel versions identified by commit hashes, and a patch has been released to fix the improper freeing logic by ensuring only encoders of inflexible links are freed, preventing the double free scenario.

Potential Impact

For European organizations, the impact of CVE-2024-49989 depends largely on their use of Linux systems with AMD GPUs, particularly in environments where kernel modules might be dynamically unloaded and reloaded, such as development, testing, or certain server configurations. The vulnerability can cause system instability or crashes, leading to denial of service. In critical infrastructure or data center environments relying on AMD GPUs for compute or graphics tasks, unexpected kernel panics could disrupt services. Although exploitation requires privileged access to unload kernel modules, an attacker who gains such access could trigger the vulnerability to cause system outages or potentially escalate privileges if combined with other vulnerabilities. This risk is heightened in multi-tenant environments or cloud providers using AMD GPU-enabled Linux hosts. Additionally, organizations running Linux distributions with affected kernel versions must apply patches promptly to maintain system integrity and availability. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel code base means it could be targeted in the future.

Mitigation Recommendations

1. Apply the official Linux kernel patches that fix the double free in the amdgpu module as soon as they are available from trusted sources or distribution maintainers. 2. Avoid unloading the amdgpu kernel module unless necessary, especially on production systems, to reduce exposure. 3. Restrict root or administrative access to trusted personnel only, as unloading kernel modules requires elevated privileges. 4. Monitor system logs for unusual kernel errors or crashes related to amdgpu or module unloading activities. 5. For environments using AMD GPUs extensively, consider implementing kernel live patching solutions to apply fixes without downtime. 6. Conduct regular audits of kernel module usage and ensure that system configurations do not allow unnecessary module unloading. 7. Employ security mechanisms such as SELinux or AppArmor to limit the capabilities of processes that could attempt to unload kernel modules. 8. Stay informed through Linux kernel mailing lists and security advisories for any updates or exploit reports related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.054Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfc02

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:56:37 PM

Last updated: 8/12/2025, 3:49:06 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats