CVE-2024-43899

5.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in the AMD GPU display driver for Linux kernels allows local attackers to cause a kernel panic and system crash. This affects systems with AMD DCN401 dGPUs running vulnerable Linux kernel versions. The vulnerability is triggered during fullscreen video playback with specific media player configurations.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU display driver (amdgpu)
Versions: Linux kernel versions containing the vulnerable dcn20_resource.c code, specifically affecting systems with AMD DCN401 dGPUs.
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD DCN401 dGPU hardware and triggering the vulnerable code path through specific video playback actions.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local denial of service causing kernel panic and system crash, potentially leading to data loss or corruption if unsaved work exists.

🟠

Likely Case

System crash requiring reboot when users trigger the specific video playback scenario described in the CVE.

🟢

If Mitigated

No impact if patched or if the vulnerable code path is not triggered.

🌐 Internet-Facing: LOW - Requires local access and specific user actions to trigger.
🏢 Internal Only: MEDIUM - Local users can crash systems, but requires specific hardware and software configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires local access and specific user actions but no special privileges.

Exploitation requires local user to run mpv with specific parameters and trigger fullscreen playback.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel patches: 6940c1d0c84a34d5a2038714c218238101a1db5b, 974fccd61758599a9716c4b909d9226749efe37e, ecbf60782662f0a388493685b85a645a0ba1613c

Vendor Advisory: https://git.kernel.org/stable/c/6940c1d0c84a34d5a2038714c218238101a1db5b

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For Ubuntu: sudo apt update && sudo apt upgrade linux-image-generic. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid triggering vulnerable code path

linux

Prevent users from running mpv with the specific parameters that trigger the vulnerability.

Disable AMD GPU hardware acceleration

linux

Temporarily disable hardware video acceleration to avoid the vulnerable code path.

echo 'options amdgpu dc=0' | sudo tee /etc/modprobe.d/amdgpu-disable.conf
sudo update-initramfs -u
sudo reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable configurations.
  • Implement monitoring for kernel panic events related to amdgpu driver.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if system has AMD DCN401 dGPU: lspci | grep -i amd && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and test the specific mpv playback scenario that previously caused crashes.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages with 'BUG: kernel NULL pointer dereference'
  • Call traces containing 'dcn20_get_dcc_compression_cap' or 'amdgpu' driver functions
  • System crash/reboot events following video playback

SIEM Query:

event_type:kernel_panic AND message:*NULL pointer dereference* AND message:*amdgpu*

🔗 References

📤 Share & Export