CVE-2024-53108: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust VSDB parser for replay feature At some point, the IEEE ID identification for the replay check in the AMD EDID was added. However, this check causes the following out-of-bounds issues when using KASAN: [ 27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu] [ 27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383 ... [ 27.821207] Memory state around the buggy address: [ 27.821215] ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821224] ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821234] >ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821243] ^ [ 27.821250] ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821259] ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821268] ================================================================== This is caused because the ID extraction happens outside of the range of the edid lenght. This commit addresses this issue by considering the amd_vsdb_block size. (cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)
AI Analysis
Technical Summary
CVE-2024-53108 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component (amdgpu), related to the handling of the VSDB (Vendor-Specific Data Block) parser for the replay feature. The issue arises from an out-of-bounds memory access triggered by improper bounds checking during the extraction of the IEEE ID from the AMD EDID (Extended Display Identification Data). The vulnerability manifests as a slab-out-of-bounds error detected by Kernel Address Sanitizer (KASAN), indicating that the code reads memory beyond the allocated buffer for the EDID data. This occurs because the ID extraction logic does not correctly consider the size of the amd_vsdb_block, leading to reading outside the valid range of the EDID length. The faulty memory access can cause kernel crashes or undefined behavior, potentially leading to denial of service or other stability issues. The fix involves adjusting the VSDB parser to properly validate the block size before extracting the IEEE ID, preventing out-of-bounds reads. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the patch and is relevant to systems using AMD GPUs with the affected driver. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2024-53108 primarily concerns systems running Linux with AMD GPU hardware, particularly those using the affected amdgpu driver versions. The vulnerability could lead to kernel crashes or system instability, resulting in denial of service conditions. This can disrupt critical services, especially in environments relying on Linux servers or workstations for graphical processing or compute tasks involving AMD GPUs. Industries such as media production, scientific research, and any sector utilizing GPU-accelerated computing could face operational interruptions. While the vulnerability does not directly indicate privilege escalation or remote code execution, the resulting instability could be leveraged in multi-tenant or shared environments to degrade service availability. European organizations with large Linux deployments, particularly those using AMD GPUs for display or compute workloads, should consider the risk of unexpected downtime and the potential impact on business continuity and service level agreements.
Mitigation Recommendations
To mitigate CVE-2024-53108, European organizations should: 1) Apply the official Linux kernel patches that address the VSDB parser bounds checking issue as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 2) Verify that all AMD GPU drivers in use are updated to versions including the fix, especially in environments with automated kernel updates disabled. 3) Conduct thorough testing of updated kernels in staging environments to ensure stability and compatibility with existing workloads. 4) Monitor system logs for KASAN or kernel oops messages that may indicate attempts to trigger the vulnerability or related instability. 5) For critical systems, consider implementing kernel live patching solutions to minimize downtime during patch deployment. 6) Limit access to systems with AMD GPUs to trusted users and processes to reduce the risk of exploitation attempts. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service events caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-53108: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust VSDB parser for replay feature At some point, the IEEE ID identification for the replay check in the AMD EDID was added. However, this check causes the following out-of-bounds issues when using KASAN: [ 27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu] [ 27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383 ... [ 27.821207] Memory state around the buggy address: [ 27.821215] ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821224] ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821234] >ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821243] ^ [ 27.821250] ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821259] ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821268] ================================================================== This is caused because the ID extraction happens outside of the range of the edid lenght. This commit addresses this issue by considering the amd_vsdb_block size. (cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)
AI-Powered Analysis
Technical Analysis
CVE-2024-53108 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component (amdgpu), related to the handling of the VSDB (Vendor-Specific Data Block) parser for the replay feature. The issue arises from an out-of-bounds memory access triggered by improper bounds checking during the extraction of the IEEE ID from the AMD EDID (Extended Display Identification Data). The vulnerability manifests as a slab-out-of-bounds error detected by Kernel Address Sanitizer (KASAN), indicating that the code reads memory beyond the allocated buffer for the EDID data. This occurs because the ID extraction logic does not correctly consider the size of the amd_vsdb_block, leading to reading outside the valid range of the EDID length. The faulty memory access can cause kernel crashes or undefined behavior, potentially leading to denial of service or other stability issues. The fix involves adjusting the VSDB parser to properly validate the block size before extracting the IEEE ID, preventing out-of-bounds reads. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the patch and is relevant to systems using AMD GPUs with the affected driver. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2024-53108 primarily concerns systems running Linux with AMD GPU hardware, particularly those using the affected amdgpu driver versions. The vulnerability could lead to kernel crashes or system instability, resulting in denial of service conditions. This can disrupt critical services, especially in environments relying on Linux servers or workstations for graphical processing or compute tasks involving AMD GPUs. Industries such as media production, scientific research, and any sector utilizing GPU-accelerated computing could face operational interruptions. While the vulnerability does not directly indicate privilege escalation or remote code execution, the resulting instability could be leveraged in multi-tenant or shared environments to degrade service availability. European organizations with large Linux deployments, particularly those using AMD GPUs for display or compute workloads, should consider the risk of unexpected downtime and the potential impact on business continuity and service level agreements.
Mitigation Recommendations
To mitigate CVE-2024-53108, European organizations should: 1) Apply the official Linux kernel patches that address the VSDB parser bounds checking issue as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 2) Verify that all AMD GPU drivers in use are updated to versions including the fix, especially in environments with automated kernel updates disabled. 3) Conduct thorough testing of updated kernels in staging environments to ensure stability and compatibility with existing workloads. 4) Monitor system logs for KASAN or kernel oops messages that may indicate attempts to trigger the vulnerability or related instability. 5) For critical systems, consider implementing kernel live patching solutions to minimize downtime during patch deployment. 6) Limit access to systems with AMD GPUs to trusted users and processes to reduce the risk of exploitation attempts. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service events caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-11-19T17:17:24.992Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfa00
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 2:57:17 PM
Last updated: 8/7/2025, 6:44:23 AM
Views: 15
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.