CVE-2024-50090
📋 TL;DR
A buffer overflow vulnerability in the Linux kernel's Intel Xe GPU driver allows local attackers to cause kernel crashes or potentially execute arbitrary code. This affects systems with Intel Lunar Lake or newer Xe2 graphics hardware running vulnerable kernel versions. The vulnerability requires local access to the system.
💻 Affected Systems
- Linux kernel with Intel Xe GPU driver (drm/xe)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise via kernel code execution.
Likely Case
Kernel panic or system crash causing denial of service.
If Mitigated
Limited to denial of service with proper kernel hardening and privilege separation.
🎯 Exploit Status
Requires local access and knowledge of GPU driver internals. The warning message in logs indicates potential exploitation attempts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel with commit 9ba0e0f30ca42a98af3689460063edfb6315718a or later
Vendor Advisory: https://git.kernel.org/stable/c/6c10ba06bb1b48acce6d4d9c1e33beb9954f1788
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable OA metrics
linuxPrevent reuse of OA batch buffers by disabling observability metrics
echo 0 > /sys/module/xe/parameters/enable_oa
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable hardware
- Monitor kernel logs for the specific warning message and investigate any occurrences
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if using Intel Xe2 graphics. Look for kernel logs containing 'Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed!'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit 9ba0e0f30ca42a98af3689460063edfb6315718a or later
📡 Detection & Monitoring
Log Indicators:
- [drm] Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed!
- kernel panic or oops messages related to drm/xe
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND "Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed!"