CVE-2024-49865

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's Direct Rendering Manager (DRM) Xe driver allows local attackers to trigger memory corruption. This vulnerability affects systems running vulnerable Linux kernel versions with the Xe graphics driver enabled. Attackers can potentially escalate privileges or cause system crashes.

💻 Affected Systems

Products:
  • Linux kernel with Xe graphics driver
Versions: Linux kernel versions containing the vulnerable code before the fix commit dcfd3971327f3ee92765154baebbaece833d3ca9
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Xe graphics driver to be enabled and loaded. Systems without Intel Xe graphics hardware or with the driver disabled are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic leading to denial of service, or arbitrary code execution in kernel context.

🟠

Likely Case

Local privilege escalation allowing attackers to gain root access on affected systems.

🟢

If Mitigated

Limited to denial of service if proper kernel hardening and privilege separation are in place.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: HIGH - Local attackers or compromised user accounts can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to make ioctl calls. The vulnerability description suggests exploitation involves timing attacks to guess VM IDs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit dcfd3971327f3ee92765154baebbaece833d3ca9 or later

Vendor Advisory: https://git.kernel.org/stable/c/09cf8901fc0225898311b375cfcc67bae37ed5da

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fix commit dcfd3971327f3ee92765154baebbaece833d3ca9. 2. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable Xe graphics driver

linux

Prevent loading of the vulnerable Xe graphics driver module

echo 'blacklist xe' >> /etc/modprobe.d/blacklist.conf
rmmod xe

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement strict privilege separation and limit user access to ioctl system calls

🔍 How to Verify

Check if Vulnerable:

Check if Xe driver is loaded: lsmod | grep xe. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commit: grep -q 'dcfd3971327f3ee92765154baebbaece833d3ca9' /proc/version_signature || uname -r

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • OOM killer activity related to Xe driver
  • Failed ioctl calls to Xe driver

SIEM Query:

process.name: "uname" AND command_line: "-r" OR kernel.panic: "*xe*"

🔗 References

📤 Share & Export