Skip to main content

CVE-2024-50090: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50090cvecve-2024-50090
Published: Tue Nov 05 2024 (11/05/2024, 17:04:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix overflow in oa batch buffer By default xe_bb_create_job() appends a MI_BATCH_BUFFER_END to batch buffer, this is not a problem if batch buffer is only used once but oa reuses the batch buffer for the same metric and at each call it appends a MI_BATCH_BUFFER_END, printing the warning below and then overflowing. [ 381.072016] ------------[ cut here ]------------ [ 381.072019] xe 0000:00:02.0: [drm] Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed! platform: LUNARLAKE subplatform: 1 graphics: Xe2_LPG / Xe2_HPG 20.04 step B0 media: Xe2_LPM / Xe2_HPM 20.00 step B0 tile: 0 VRAM 0 B GT: 0 type 1 So here checking if batch buffer already have MI_BATCH_BUFFER_END if not append it. v2: - simply fix, suggestion from Ashutosh (cherry picked from commit 9ba0e0f30ca42a98af3689460063edfb6315718a)

AI-Powered Analysis

AILast updated: 06/28/2025, 17:10:07 UTC

Technical Analysis

CVE-2024-50090 is a medium-severity vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically affecting the Intel Xe graphics driver (xe). The flaw arises from an integer overflow in the Open Analytics (oa) batch buffer handling code. The function xe_bb_create_job() appends a MI_BATCH_BUFFER_END command to the batch buffer by default. This behavior is safe if the batch buffer is used only once. However, the oa component reuses the batch buffer for the same metric multiple times, appending MI_BATCH_BUFFER_END on each call without checking if it already exists. This leads to an overflow condition, triggering an assertion failure in the kernel logs and potentially causing a denial of service (DoS) due to kernel panic or system instability. The vulnerability is rooted in improper bounds checking (CWE-120: Buffer Copy without Checking Size of Input) and affects systems running Intel Xe2 graphics platforms, including Lunar Lake subplatforms and related media and graphics components. The fix involves adding a check to ensure MI_BATCH_BUFFER_END is appended only once per batch buffer, preventing overflow. The vulnerability requires local privileges (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). It impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild as of now.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of local denial of service on Linux systems using affected Intel Xe graphics drivers. Systems running workloads that rely on the DRM subsystem for graphics or media processing could experience kernel crashes or instability, impacting availability of critical services, especially in environments using Linux for workstations, servers, or embedded systems with Intel Xe graphics. While the vulnerability does not expose data confidentiality or integrity directly, disruption of services could affect operational continuity in sectors such as finance, manufacturing, research, and public services. Organizations with Linux-based infrastructure that utilize Intel Xe graphics hardware, including cloud providers and enterprises running containerized or virtualized workloads with GPU passthrough, could be impacted. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. Given the medium CVSS score and absence of known exploits, the immediate risk is moderate but should be addressed proactively to maintain system stability and security compliance.

Mitigation Recommendations

1. Apply the official Linux kernel patch that includes the fix for CVE-2024-50090 as soon as it becomes available in your distribution's kernel updates. 2. For environments where immediate patching is not feasible, restrict access to systems with affected Intel Xe graphics to trusted users only, minimizing the risk of local exploitation. 3. Monitor kernel logs for the specific assertion failure message related to batch buffer overflow to detect potential exploitation attempts or instability. 4. Implement strict user privilege management and auditing to prevent unauthorized local access that could trigger the vulnerability. 5. In virtualized or containerized environments, ensure that GPU resources are properly isolated and that only trusted workloads have access to Intel Xe graphics devices. 6. Coordinate with hardware and Linux distribution vendors to confirm the presence of the fix and validate system stability post-update. 7. Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing systems with Intel Xe graphics hardware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.942Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfede

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 5:10:07 PM

Last updated: 8/12/2025, 2:22:33 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats