CVE-2024-45015

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's MSM DPU display driver allows local attackers to cause a kernel panic (denial of service) by triggering specific display state changes. This affects systems using Qualcomm Adreno GPU hardware with the affected kernel versions. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • Linux kernel with MSM DPU display driver
Versions: Kernel versions containing the vulnerable code before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Qualcomm Adreno GPU hardware using the MSM DPU driver. Requires local access to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service through kernel panic when specific display operations are performed.

🟢

If Mitigated

Minimal impact with proper access controls preventing local attackers from executing display operations.

🌐 Internet-Facing: LOW - Requires local access to trigger the vulnerability.
🏢 Internal Only: MEDIUM - Local users or processes could crash the system, affecting availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific display state changes. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 3bacf814b6a61cc683c68465f175ebd938f09c52, 3fb61718bcbe309279205d1cc275a6435611dc77, or aedf02e46eb549dac8db4821a6b9f0c6bf6e3990

Vendor Advisory: https://patchwork.freedesktop.org/patch/606729/

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. For distributions: Use package manager (apt/yum/dnf) to update kernel package.

🔧 Temporary Workarounds

Restrict local access

linux

Limit local user access to prevent triggering the vulnerability

Disable affected hardware

linux

Disable Qualcomm Adreno GPU hardware if not required

echo 'blacklist msm' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor system logs for kernel panic events and investigate unauthorized local access attempts

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if MSM DPU driver is loaded: 'lsmod | grep msm' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains fix commits: 'git log --oneline | grep -E "3bacf814b6a61cc683c68465f175ebd938f09c52|3fb61718bcbe309279205d1cc275a6435611dc77|aedf02e46eb549dac8db4821a6b9f0c6bf6e3990"'

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • NULL pointer dereference errors in kernel logs

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "kernel panic" OR "Oops") AND process="msm"

🔗 References

📤 Share & Export