CVE-2024-49942

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's Xe graphics driver. When the xe_migrate_copy function attempts to copy from a null source resource, it triggers a kernel crash. This affects systems running vulnerable Linux kernel versions with the Xe driver enabled.

💻 Affected Systems

Products:
  • Linux kernel with Xe graphics driver
Versions: Linux kernel versions containing the vulnerable Xe driver code before the fix commits
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the Xe graphics driver. The vulnerability was discovered during kunit testing.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or system instability.

🟠

Likely Case

System crash or kernel panic when specific graphics operations are performed with null resources.

🟢

If Mitigated

No impact if the system is patched or doesn't use the affected Xe driver functionality.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring local access or specific driver operations.
🏢 Internal Only: MEDIUM - Could be triggered by local users or applications performing graphics operations, potentially causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering specific graphics driver operations with null resources. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 16e0267db156f8a4ea16bfb3ac3f5743c9698df3, 7257d9c9a3c6cfe26c428e9b7ae21d61f2f55a79, 8f5199b6971f0717c2d31685953971fa2e1b9e1a

Vendor Advisory: https://git.kernel.org/stable/c/16e0267db156f8a4ea16bfb3ac3f5743c9698df3

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable Xe driver

linux

Remove or blacklist the Xe graphics driver module

echo 'blacklist xe' >> /etc/modprobe.d/blacklist.conf
rmmod xe

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Monitor for kernel panic events and system crashes

🔍 How to Verify

Check if Vulnerable:

Check if system is using a vulnerable kernel version with Xe driver: 'uname -r' and check if Xe module is loaded: 'lsmod | grep xe'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check kernel logs for absence of xe_migrate_copy related crashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in dmesg
  • xe_migrate_copy function in crash logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "xe_migrate_copy" OR "kernel panic")

🔗 References

📤 Share & Export