CVE-2024-43904

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the AMD display driver within the Linux kernel. If exploited, it could cause a kernel crash (kernel panic) leading to system instability or denial of service. This affects Linux systems with AMD graphics hardware using the affected kernel versions.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU drivers
Versions: Specific kernel versions containing the vulnerable dcn30_apply_idle_power_optimizations function before the fix commits
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD GPU hardware and the affected display driver code path to be triggered.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, requiring physical or remote reboot, potentially causing data loss or service disruption.

🟠

Likely Case

System instability or crash when specific display operations are performed, requiring reboot to recover.

🟢

If Mitigated

No impact if proper kernel hardening is in place and system is patched.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific display operations.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability, potentially causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific display operations that cause null pointer dereference. Likely requires local access or ability to manipulate display operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits referenced in the CVE

Vendor Advisory: https://git.kernel.org/stable/c/10c20d79d59cadfe572480d98cec271a89ffb024

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable AMD GPU power optimizations

linux

Prevent the vulnerable code path from being triggered by disabling idle power optimizations for AMD GPUs

echo 'options amdgpu dcfeaturemask=0' > /etc/modprobe.d/amdgpu-disable-power-opt.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD GPUs
  • Monitor system logs for kernel panic events related to display operations

🔍 How to Verify

Check if Vulnerable:

Check if kernel version is affected by examining kernel source or checking if system has AMD GPU and vulnerable kernel version

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains one of the fix commit hashes: 10c20d79d59cadfe572480d98cec271a89ffb024, 15c2990e0f0108b9c3752d7072a97d45d4283aea, 16a8a2a839d19c4cf7253642b493ffb8eee1d857, 5e84eda48ffb2363437db44bbd0235594f8a58f9, or fcf9d6a9f30ea414b6b84a6e901cebd44e146847

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • AMD GPU driver crash logs
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability

SIEM Query:

event_type:"kernel_panic" OR event_type:"system_crash" AND process_name:"amdgpu" OR message:"dcn30_apply_idle_power_optimizations"

🔗 References

📤 Share & Export