CVE-2024-50090: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix overflow in oa batch buffer By default xe_bb_create_job() appends a MI_BATCH_BUFFER_END to batch buffer, this is not a problem if batch buffer is only used once but oa reuses the batch buffer for the same metric and at each call it appends a MI_BATCH_BUFFER_END, printing the warning below and then overflowing. [ 381.072016] ------------[ cut here ]------------ [ 381.072019] xe 0000:00:02.0: [drm] Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed! platform: LUNARLAKE subplatform: 1 graphics: Xe2_LPG / Xe2_HPG 20.04 step B0 media: Xe2_LPM / Xe2_HPM 20.00 step B0 tile: 0 VRAM 0 B GT: 0 type 1 So here checking if batch buffer already have MI_BATCH_BUFFER_END if not append it. v2: - simply fix, suggestion from Ashutosh (cherry picked from commit 9ba0e0f30ca42a98af3689460063edfb6315718a)
AI Analysis
Technical Summary
CVE-2024-50090 is a medium-severity vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically affecting the Intel Xe graphics driver (xe). The flaw arises from an integer overflow in the Open Analytics (oa) batch buffer handling code. The function xe_bb_create_job() appends a MI_BATCH_BUFFER_END command to the batch buffer by default. This behavior is safe if the batch buffer is used only once. However, the oa component reuses the batch buffer for the same metric multiple times, appending MI_BATCH_BUFFER_END on each call without checking if it already exists. This leads to an overflow condition, triggering an assertion failure in the kernel logs and potentially causing a denial of service (DoS) due to kernel panic or system instability. The vulnerability is rooted in improper bounds checking (CWE-120: Buffer Copy without Checking Size of Input) and affects systems running Intel Xe2 graphics platforms, including Lunar Lake subplatforms and related media and graphics components. The fix involves adding a check to ensure MI_BATCH_BUFFER_END is appended only once per batch buffer, preventing overflow. The vulnerability requires local privileges (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). It impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of local denial of service on Linux systems using affected Intel Xe graphics drivers. Systems running workloads that rely on the DRM subsystem for graphics or media processing could experience kernel crashes or instability, impacting availability of critical services, especially in environments using Linux for workstations, servers, or embedded systems with Intel Xe graphics. While the vulnerability does not expose data confidentiality or integrity directly, disruption of services could affect operational continuity in sectors such as finance, manufacturing, research, and public services. Organizations with Linux-based infrastructure that utilize Intel Xe graphics hardware, including cloud providers and enterprises running containerized or virtualized workloads with GPU passthrough, could be impacted. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. Given the medium CVSS score and absence of known exploits, the immediate risk is moderate but should be addressed proactively to maintain system stability and security compliance.
Mitigation Recommendations
1. Apply the official Linux kernel patch that includes the fix for CVE-2024-50090 as soon as it becomes available in your distribution's kernel updates. 2. For environments where immediate patching is not feasible, restrict access to systems with affected Intel Xe graphics to trusted users only, minimizing the risk of local exploitation. 3. Monitor kernel logs for the specific assertion failure message related to batch buffer overflow to detect potential exploitation attempts or instability. 4. Implement strict user privilege management and auditing to prevent unauthorized local access that could trigger the vulnerability. 5. In virtualized or containerized environments, ensure that GPU resources are properly isolated and that only trusted workloads have access to Intel Xe graphics devices. 6. Coordinate with hardware and Linux distribution vendors to confirm the presence of the fix and validate system stability post-update. 7. Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing systems with Intel Xe graphics hardware.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-50090: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix overflow in oa batch buffer By default xe_bb_create_job() appends a MI_BATCH_BUFFER_END to batch buffer, this is not a problem if batch buffer is only used once but oa reuses the batch buffer for the same metric and at each call it appends a MI_BATCH_BUFFER_END, printing the warning below and then overflowing. [ 381.072016] ------------[ cut here ]------------ [ 381.072019] xe 0000:00:02.0: [drm] Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed! platform: LUNARLAKE subplatform: 1 graphics: Xe2_LPG / Xe2_HPG 20.04 step B0 media: Xe2_LPM / Xe2_HPM 20.00 step B0 tile: 0 VRAM 0 B GT: 0 type 1 So here checking if batch buffer already have MI_BATCH_BUFFER_END if not append it. v2: - simply fix, suggestion from Ashutosh (cherry picked from commit 9ba0e0f30ca42a98af3689460063edfb6315718a)
AI-Powered Analysis
Technical Analysis
CVE-2024-50090 is a medium-severity vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically affecting the Intel Xe graphics driver (xe). The flaw arises from an integer overflow in the Open Analytics (oa) batch buffer handling code. The function xe_bb_create_job() appends a MI_BATCH_BUFFER_END command to the batch buffer by default. This behavior is safe if the batch buffer is used only once. However, the oa component reuses the batch buffer for the same metric multiple times, appending MI_BATCH_BUFFER_END on each call without checking if it already exists. This leads to an overflow condition, triggering an assertion failure in the kernel logs and potentially causing a denial of service (DoS) due to kernel panic or system instability. The vulnerability is rooted in improper bounds checking (CWE-120: Buffer Copy without Checking Size of Input) and affects systems running Intel Xe2 graphics platforms, including Lunar Lake subplatforms and related media and graphics components. The fix involves adding a check to ensure MI_BATCH_BUFFER_END is appended only once per batch buffer, preventing overflow. The vulnerability requires local privileges (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). It impacts availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of local denial of service on Linux systems using affected Intel Xe graphics drivers. Systems running workloads that rely on the DRM subsystem for graphics or media processing could experience kernel crashes or instability, impacting availability of critical services, especially in environments using Linux for workstations, servers, or embedded systems with Intel Xe graphics. While the vulnerability does not expose data confidentiality or integrity directly, disruption of services could affect operational continuity in sectors such as finance, manufacturing, research, and public services. Organizations with Linux-based infrastructure that utilize Intel Xe graphics hardware, including cloud providers and enterprises running containerized or virtualized workloads with GPU passthrough, could be impacted. The requirement for local privileges limits remote exploitation, but insider threats or compromised user accounts could trigger the issue. Given the medium CVSS score and absence of known exploits, the immediate risk is moderate but should be addressed proactively to maintain system stability and security compliance.
Mitigation Recommendations
1. Apply the official Linux kernel patch that includes the fix for CVE-2024-50090 as soon as it becomes available in your distribution's kernel updates. 2. For environments where immediate patching is not feasible, restrict access to systems with affected Intel Xe graphics to trusted users only, minimizing the risk of local exploitation. 3. Monitor kernel logs for the specific assertion failure message related to batch buffer overflow to detect potential exploitation attempts or instability. 4. Implement strict user privilege management and auditing to prevent unauthorized local access that could trigger the vulnerability. 5. In virtualized or containerized environments, ensure that GPU resources are properly isolated and that only trusted workloads have access to Intel Xe graphics devices. 6. Coordinate with hardware and Linux distribution vendors to confirm the presence of the fix and validate system stability post-update. 7. Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing systems with Intel Xe graphics hardware.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.942Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfede
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 5:10:07 PM
Last updated: 8/12/2025, 2:22:33 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.