CVE-2024-49911

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the AMD display driver component of the Linux kernel. If exploited, it could cause a kernel panic or system crash, affecting systems using AMD graphics hardware with the vulnerable driver version.

💻 Affected Systems

Products:
  • Linux kernel with AMD display driver (drm/amd/display)
Versions: Linux kernel versions containing the vulnerable dcn20_set_output_transfer_func function before the fix commits
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD graphics hardware using the vulnerable display driver component. The vulnerability is in the kernel's display driver code, not in user-space applications.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or system instability.

🟠

Likely Case

System crash or kernel panic when the vulnerable display driver function is triggered, resulting in temporary denial of service.

🟢

If Mitigated

No impact if the vulnerable code path isn't triggered or if proper input validation prevents the null pointer dereference.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring local access or specific driver interaction.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the vulnerability, causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the specific vulnerable code path in the display driver, which may require specific graphics operations or conditions. No public exploits are known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits: 02411e9359297512946705b1cd8cf5e6b0806fa0, 62ed6f0f198da04e884062264df308277628004f, 827380b114f83c30b3e56d1a675980b6d65f7c88, 8c854138b593efbbd8fa46a25f3288c121c1d1a1, e8a24767899c86f4c5f1e4d3b2608942d054900f

Vendor Advisory: https://git.kernel.org/stable/c/02411e9359297512946705b1cd8cf5e6b0806fa0

Restart Required: Yes

Instructions:

1. Update to a Linux kernel version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel. 4. Verify the fix is applied by checking kernel version or commit hash.

🔧 Temporary Workarounds

Avoid triggering vulnerable display operations

linux

Limit or avoid operations that might trigger the vulnerable display driver function, though this is impractical for most use cases.

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement monitoring for kernel panics or system crashes related to display operations

🔍 How to Verify

Check if Vulnerable:

Check if your Linux kernel version contains the vulnerable dcn20_set_output_transfer_func function without the null check fix. Examine kernel source or check distribution security advisories.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes one of the fix commits: 02411e9359297512946705b1cd8cf5e6b0806fa0, 62ed6f0f198da04e884062264df308277628004f, 827380b114f83c30b3e56d1a675980b6d65f7c88, 8c854138b593efbbd8fa46a25f3288c121c1d1a1, or e8a24767899c86f4c5f1e4d3b2608942d054900f

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • System crash logs related to display driver or AMD GPU

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "NULL pointer dereference") AND ("drm" OR "amd" OR "display")

🔗 References

📤 Share & Export