CVE-2024-50149

5.5 MEDIUM

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's Xe graphics driver. Attackers could potentially exploit this to cause kernel crashes or execute arbitrary code with kernel privileges. Systems running affected Linux kernel versions with Xe graphics driver enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with Xe graphics driver
Versions: Specific kernel versions containing the vulnerable commit up to the fix commit
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Xe graphics driver to be enabled and in use. Systems without Xe driver or with it disabled are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

Kernel crash leading to denial of service, system instability, or privilege escalation for local attackers.

🟢

If Mitigated

Limited to denial of service if exploit attempts are detected and blocked by security controls.

🌐 Internet-Facing: LOW - This requires local access or ability to execute code on the system.
🏢 Internal Only: MEDIUM - Local attackers or compromised user accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of kernel memory layout. No public exploits are currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commit ea2f6a77d0c40d97f4a4dc93fee4afe15d94926d or later

Vendor Advisory: https://git.kernel.org/stable/c/82926f52d7a09c65d916c0ef8d4305fc95d68c0c

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable Xe graphics driver

linux

Prevent loading of the vulnerable Xe graphics driver module

echo 'blacklist xe' >> /etc/modprobe.d/blacklist-xe.conf
rmmod xe
update-initramfs -u

🧯 If You Can't Patch

  • Restrict local user access to systems with Xe driver enabled
  • Implement strict privilege separation and limit user capabilities

🔍 How to Verify

Check if Vulnerable:

Check if Xe driver is loaded: lsmod | grep xe. Check kernel version against affected range.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and Xe driver loads without issues. Monitor system logs for stability.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes or hangs
  • Xe driver error messages in dmesg

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("oops" OR "panic" OR "xe" AND "error")

🔗 References

📤 Share & Export