CVE-2024-42123
📋 TL;DR
This CVE describes a double-free vulnerability in the AMD GPU driver within the Linux kernel. When triggered, it could cause kernel crashes or potentially allow local privilege escalation. Systems running Linux with AMD GPUs and the affected kernel versions are vulnerable.
💻 Affected Systems
- Linux kernel with AMD GPU driver (drm/amdgpu)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise, or kernel panic causing system instability and denial of service.
Likely Case
Kernel crash or system instability when the AMD GPU driver handles bad memory pages during polling operations.
If Mitigated
Minor system instability or warning messages in kernel logs without significant impact.
🎯 Exploit Status
Exploitation requires local access and specific conditions to trigger the double-free condition during bad page polling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 506c245f3f1cd989cb89811a7f06e04ff8813a0d and 8e24beb3c2b08a4763f920399a9cc577ed440a1a
Vendor Advisory: https://git.kernel.org/stable/c/506c245f3f1cd989cb89811a7f06e04ff8813a0d
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version and that amdgpu module loads correctly.
🔧 Temporary Workarounds
Disable AMD GPU driver
linuxTemporarily disable the vulnerable amdgpu driver if AMD GPU is not essential
echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict local user access to systems with AMD GPUs
- Monitor kernel logs for double-free warnings related to amdgpu
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if amdgpu module is loaded: lsmod | grep amdgpu
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check dmesg for absence of double-free warnings related to amdgpu_umc
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Double-free warnings in dmesg
- amdgpu driver crash logs
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("double free" OR "amdgpu" OR "kernel panic")