Cyber Posture

CVE-2024-49570

High

Published: 27 February 2025

Published
27 February 2025
Modified
24 March 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF The commit afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format") exposes potential UAFs in the xe_bo_move trace event. Fix those by avoiding dereferencing the xe_mem_type_to_name[] array at TP_printk time. Since some code refactoring has taken place, explicit backporting may be needed for kernels older than 6.10.

Security Summary

CVE-2024-49570 is a Use After Free (UAF) vulnerability in the Linux kernel's drm/xe/tracing subsystem, specifically affecting the xe_bo_move trace event. The issue stems from a prior commit that exposed potential UAFs by dereferencing the xe_mem_type_to_name[] array during TP_printk processing. It impacts Linux kernels, with explicit backporting required for versions older than 6.10 due to code refactoring.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction, as indicated by its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Successful exploitation could allow the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially leading to arbitrary code execution or system crashes within the kernel context.

The provided patch references detail the fix by avoiding dereference of the xe_mem_type_to_name[] array at TP_printk time. Kernel stable trees have applied commits such as 07089083a526, 62cd174616ae, and c9402da34611 to resolve the issue, emphasizing the need for manual backports to older kernels.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.11 — 6.12.16 · 6.13 — 6.13.4

References