CVE-2024-49570
Published: 27 February 2025
Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF The commit afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format") exposes potential UAFs in the xe_bo_move trace event. Fix those by avoiding dereferencing the xe_mem_type_to_name[] array at TP_printk time. Since some code refactoring has taken place, explicit backporting may be needed for kernels older than 6.10.
Security Summary
CVE-2024-49570 is a Use After Free (UAF) vulnerability in the Linux kernel's drm/xe/tracing subsystem, specifically affecting the xe_bo_move trace event. The issue stems from a prior commit that exposed potential UAFs by dereferencing the xe_mem_type_to_name[] array during TP_printk processing. It impacts Linux kernels, with explicit backporting required for versions older than 6.10 due to code refactoring.
A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction, as indicated by its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Successful exploitation could allow the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially leading to arbitrary code execution or system crashes within the kernel context.
The provided patch references detail the fix by avoiding dereference of the xe_mem_type_to_name[] array at TP_printk time. Kernel stable trees have applied commits such as 07089083a526, 62cd174616ae, and c9402da34611 to resolve the issue, emphasizing the need for manual backports to older kernels.
Details
- CWE(s)