Skip to main content

CVE-2024-50187: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50187cvecve-2024-50187
Published: Fri Nov 08 2024 (11/08/2024, 05:38:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Stop the active perfmon before being destroyed Upon closing the file descriptor, the active performance monitor is not stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`, the active performance monitor's pointer (`vc4->active_perfmon`) is still retained. If we open a new file descriptor and submit a few jobs with performance monitors, the driver will attempt to stop the active performance monitor using the stale pointer in `vc4->active_perfmon`. However, this pointer is no longer valid because the previous process has already terminated, and all performance monitors associated with it have been destroyed and freed. To fix this, when the active performance monitor belongs to a given process, explicitly stop it before destroying and freeing it.

AI-Powered Analysis

AILast updated: 06/28/2025, 12:40:38 UTC

Technical Analysis

CVE-2024-50187 is a vulnerability in the Linux kernel's drm/vc4 driver, which manages the VideoCore IV GPU commonly found in Broadcom SoCs used in devices like the Raspberry Pi. The flaw arises from improper handling of the active performance monitor (perfmon) lifecycle. Specifically, when a file descriptor associated with a perfmon is closed, the active perfmon is not explicitly stopped before being destroyed. Although all perfmons are destroyed in the vc4_perfmon_close_file() function, the pointer to the active perfmon (vc4->active_perfmon) remains set to a stale reference. If a new file descriptor is opened and jobs are submitted with performance monitors, the driver attempts to stop the active perfmon using this invalid pointer. Since the previous process has terminated and its perfmons have been freed, this results in use-after-free behavior. This can lead to undefined behavior including potential kernel crashes or memory corruption. The patch fixes the issue by ensuring that the active perfmon is explicitly stopped before it is destroyed and freed, preventing the stale pointer dereference. This vulnerability is rooted in resource management and pointer lifecycle errors within the kernel's GPU driver code.

Potential Impact

For European organizations, the impact of CVE-2024-50187 depends largely on their use of Linux systems running the affected drm/vc4 driver, notably devices using Broadcom VideoCore IV GPUs such as Raspberry Pi platforms. Exploitation could lead to local privilege escalation or denial of service through kernel crashes, impacting system availability and potentially allowing attackers to execute arbitrary code in kernel context. This is particularly relevant for organizations relying on embedded Linux devices for industrial control, IoT deployments, or edge computing where Raspberry Pi or similar hardware is prevalent. Disruption of these systems could affect operational continuity, data integrity, and confidentiality if attackers leverage the vulnerability to escalate privileges or cause system instability. While no known exploits are currently reported in the wild, the vulnerability's presence in a widely used open-source kernel component means that targeted attacks or automated exploitation attempts could emerge, posing a risk to critical infrastructure and services in Europe.

Mitigation Recommendations

To mitigate CVE-2024-50187, European organizations should: 1) Apply the official Linux kernel patches that explicitly stop the active perfmon before destruction as soon as they become available, ensuring their Linux distributions or custom kernels incorporate these fixes. 2) For embedded or IoT devices using Broadcom VideoCore IV GPUs, coordinate with device vendors or maintainers to update firmware and kernel versions promptly. 3) Implement strict access controls and monitoring on systems running the affected driver to detect unusual activity or attempts to open new file descriptors for perfmon operations. 4) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation likelihood. 5) Conduct regular audits of embedded Linux devices and edge systems to inventory affected hardware and software versions, prioritizing patch deployment on critical assets. 6) Consider network segmentation and isolation for vulnerable devices to limit attacker lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.967Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf438

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 12:40:38 PM

Last updated: 8/15/2025, 3:25:02 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats