Skip to main content

CVE-2024-53108: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53108cvecve-2024-53108
Published: Mon Dec 02 2024 (12/02/2024, 13:44:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust VSDB parser for replay feature At some point, the IEEE ID identification for the replay check in the AMD EDID was added. However, this check causes the following out-of-bounds issues when using KASAN: [ 27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu] [ 27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383 ... [ 27.821207] Memory state around the buggy address: [ 27.821215] ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821224] ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821234] >ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821243] ^ [ 27.821250] ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821259] ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.821268] ================================================================== This is caused because the ID extraction happens outside of the range of the edid lenght. This commit addresses this issue by considering the amd_vsdb_block size. (cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)

AI-Powered Analysis

AILast updated: 06/28/2025, 14:57:17 UTC

Technical Analysis

CVE-2024-53108 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component (amdgpu), related to the handling of the VSDB (Vendor-Specific Data Block) parser for the replay feature. The issue arises from an out-of-bounds memory access triggered by improper bounds checking during the extraction of the IEEE ID from the AMD EDID (Extended Display Identification Data). The vulnerability manifests as a slab-out-of-bounds error detected by Kernel Address Sanitizer (KASAN), indicating that the code reads memory beyond the allocated buffer for the EDID data. This occurs because the ID extraction logic does not correctly consider the size of the amd_vsdb_block, leading to reading outside the valid range of the EDID length. The faulty memory access can cause kernel crashes or undefined behavior, potentially leading to denial of service or other stability issues. The fix involves adjusting the VSDB parser to properly validate the block size before extracting the IEEE ID, preventing out-of-bounds reads. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the patch and is relevant to systems using AMD GPUs with the affected driver. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations, the impact of CVE-2024-53108 primarily concerns systems running Linux with AMD GPU hardware, particularly those using the affected amdgpu driver versions. The vulnerability could lead to kernel crashes or system instability, resulting in denial of service conditions. This can disrupt critical services, especially in environments relying on Linux servers or workstations for graphical processing or compute tasks involving AMD GPUs. Industries such as media production, scientific research, and any sector utilizing GPU-accelerated computing could face operational interruptions. While the vulnerability does not directly indicate privilege escalation or remote code execution, the resulting instability could be leveraged in multi-tenant or shared environments to degrade service availability. European organizations with large Linux deployments, particularly those using AMD GPUs for display or compute workloads, should consider the risk of unexpected downtime and the potential impact on business continuity and service level agreements.

Mitigation Recommendations

To mitigate CVE-2024-53108, European organizations should: 1) Apply the official Linux kernel patches that address the VSDB parser bounds checking issue as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 2) Verify that all AMD GPU drivers in use are updated to versions including the fix, especially in environments with automated kernel updates disabled. 3) Conduct thorough testing of updated kernels in staging environments to ensure stability and compatibility with existing workloads. 4) Monitor system logs for KASAN or kernel oops messages that may indicate attempts to trigger the vulnerability or related instability. 5) For critical systems, consider implementing kernel live patching solutions to minimize downtime during patch deployment. 6) Limit access to systems with AMD GPUs to trusted users and processes to reduce the risk of exploitation attempts. 7) Maintain regular backups and incident response plans to quickly recover from potential denial of service events caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:24.992Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfa00

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 2:57:17 PM

Last updated: 8/7/2025, 6:44:23 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats