CVE-2024-49991
📋 TL;DR
This CVE describes a use-after-free vulnerability in the AMDKFD (AMD Kernel Fusion Driver) component of the Linux kernel. An attacker with local access could exploit this to cause a kernel crash (denial of service) or potentially execute arbitrary code with kernel privileges. Systems running affected Linux kernel versions with AMD GPU drivers are vulnerable.
💻 Affected Systems
- Linux kernel with AMDKFD driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel mode, allowing complete system compromise, data theft, or persistent backdoor installation.
Likely Case
Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.
If Mitigated
Limited to denial of service if kernel hardening features like KASLR and SMEP are enabled, preventing reliable code execution.
🎯 Exploit Status
Exploitation requires local access and knowledge of kernel memory layout. No public exploits are known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits: 30ceb873cc2e97348d9da2265b2d1ddf07f682e1, 6c9289806591807e4e3be9a23df8ee2069180055, 71f3240f82987f0f070ea5bed559033de7d4c0e1, c86ad39140bbcb9dc75a10046c2221f657e8083b, e7831613cbbcd9058d3658fbcdc5d5884ceb2e0c
Vendor Advisory: https://git.kernel.org/stable/c/30ceb873cc2e97348d9da2265b2d1ddf07f682e1
Restart Required: Yes
Instructions:
1. Update the Linux kernel to a version containing the fix commits. 2. Reboot the system to load the new kernel. 3. Verify the fix by checking the kernel version and ensuring the amdkfd module loads without issues.
🔧 Temporary Workarounds
Disable AMDKFD module
linuxPrevent loading of the vulnerable amdkfd driver if AMD GPU functionality is not required.
echo 'blacklist amdkfd' >> /etc/modprobe.d/blacklist-amdkfd.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict local user access to essential personnel only and implement strict privilege separation.
- Enable kernel hardening features like KASLR, SMEP, and SMAP to reduce exploit reliability.
🔍 How to Verify
Check if Vulnerable:
Check if the amdkfd module is loaded: lsmod | grep amdkfd. If loaded, check kernel version against affected ranges in git commits.
Check Version:
uname -r
Verify Fix Applied:
Verify the kernel version includes one of the fix commits: uname -r and cross-reference with the git commit hashes.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs in /var/log/kern.log or dmesg output indicating use-after-free or amdkfd crashes.
Network Indicators:
- None - this is a local vulnerability.
SIEM Query:
source="kern.log" AND ("use-after-free" OR "amdkfd" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/30ceb873cc2e97348d9da2265b2d1ddf07f682e1
- https://git.kernel.org/stable/c/6c9289806591807e4e3be9a23df8ee2069180055
- https://git.kernel.org/stable/c/71f3240f82987f0f070ea5bed559033de7d4c0e1
- https://git.kernel.org/stable/c/c86ad39140bbcb9dc75a10046c2221f657e8083b
- https://git.kernel.org/stable/c/e7831613cbbcd9058d3658fbcdc5d5884ceb2e0c
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html