CVE-2024-42074

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the Linux kernel's AMD ACP audio driver. When the system resumes from suspend mode, a missing null check could cause a kernel panic if the chip platform device wasn't properly initialized. This affects Linux systems with AMD processors using the affected ACP audio driver.

💻 Affected Systems

Products:
  • Linux kernel with AMD ACP audio driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD processors using the ACP audio subsystem. Vulnerability triggers during system resume from suspend state.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash when resuming from suspend state on affected hardware configurations.

🟢

If Mitigated

No impact if the system doesn't use suspend/resume functionality or if the ACP device is properly initialized.

🌐 Internet-Facing: LOW - Requires local access to trigger via suspend/resume cycle.
🏢 Internal Only: MEDIUM - Could cause service disruption for affected workstations/servers during maintenance windows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to trigger suspend/resume cycle. No privilege escalation or remote code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 98d919dfee1cc402ca29d45da642852d7c9a2301 or b0c39ae1cc86afe74aa2f6273ccb514f8d180cf6

Vendor Advisory: https://git.kernel.org/stable/c/98d919dfee1cc402ca29d45da642852d7c9a2301

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable suspend functionality

linux

Prevent system from entering suspend state where vulnerability triggers

systemctl mask sleep.target suspend.target hibernate.target hybrid-sleep.target

Blacklist ACP driver

linux

Prevent loading of vulnerable ACP audio driver

echo 'blacklist snd_acp' >> /etc/modprobe.d/blacklist-acp.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Avoid using system suspend/resume functionality on affected systems
  • Implement monitoring for kernel panics and have recovery procedures ready

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ACP module is loaded: 'lsmod | grep snd_acp' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • System crash during resume from suspend

Network Indicators:

  • Sudden loss of connectivity from system after suspend/resume

SIEM Query:

source="kernel" AND "panic" AND "snd_acp" OR "ACP"

🔗 References

📤 Share & Export