CVE-2024-27045

7.8 HIGH

📋 TL;DR

This CVE describes a buffer overflow vulnerability in the Linux kernel's AMD display driver. An attacker could exploit this to cause kernel memory corruption, potentially leading to system crashes or privilege escalation. Systems running affected Linux kernel versions with AMD graphics hardware are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU drivers
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD GPU hardware and debugfs mounted. Debugfs typically requires root access by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel mode if combined with other vulnerabilities.

🟠

Likely Case

System crash or instability when accessing the debugfs interface, requiring reboot.

🟢

If Mitigated

Limited impact if debugfs is not mounted or access is restricted to privileged users only.

🌐 Internet-Facing: LOW - Requires local access to debugfs interface.
🏢 Internal Only: MEDIUM - Local users could potentially crash systems or escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to write to debugfs. Buffer overflow is limited to 20 bytes beyond buffer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from the referenced git commits

Vendor Advisory: https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version is updated.

🔧 Temporary Workarounds

Disable debugfs access

linux

Prevent non-root users from accessing debugfs interface

mount -o remount,nodev,noexec,nosuid /sys/kernel/debug

Unmount debugfs

linux

Completely unmount debugfs filesystem

umount /sys/kernel/debug

🧯 If You Can't Patch

  • Restrict debugfs access to root only using mount options
  • Implement strict access controls on /sys/kernel/debug directory

🔍 How to Verify

Check if Vulnerable:

Check if kernel version is affected and debugfs is mounted: 'mount | grep debugfs' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable commits and test debugfs functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crash/reboot logs
  • Access to /sys/kernel/debug/amdgpu_dm_dsc_clock_en

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or unauthorized access to debugfs paths

🔗 References

📤 Share & Export