CVE-2024-42227
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-42227 affects the Linux kernel's AMD display driver, specifically in the drm/amd/display component. The vulnerability was discovered and disclosed on July 30, 2024, affecting Linux kernel versions up to (excluding) 6.9.9. The issue involves an overlapping memory copy operation within the dmlcoremode_programming function that could lead to unexpected behavior (NVD, Debian).

Technical details

The vulnerability exists in the dmlcoremodeprogramming function where &modelib->mp.Watermark and &locals->Watermark share the same memory address. The original code used memcpy() for copying data between these overlapping memory regions, which could lead to undefined behavior. The CVSS v3.1 base score is 4.7 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability could result in unexpected behavior in the AMD display driver when copying watermark data, potentially leading to system instability or denial of service in the affected component. The impact is limited to systems using AMD graphics hardware with the affected driver code (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed by replacing memcpy() with memmove() in the affected code. The fix is included in Linux kernel version 6.9.9 and has been backported to various stable kernel versions. Users should update their systems to the patched versions available through their distribution's package management system (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management