CVE-2024-56695
📋 TL;DR
A stack overflow vulnerability in the Linux kernel's AMD GPU driver could allow local attackers to crash the kernel or potentially execute arbitrary code. This affects systems with AMD GPUs running vulnerable kernel versions. The vulnerability requires local access to exploit.
💻 Affected Systems
- Linux kernel with AMD GPU driver (amdgpu/amdkfd)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential privilege escalation to kernel mode execution
Likely Case
Kernel crash causing system instability or denial of service
If Mitigated
No impact if patched or if system lacks AMD GPU hardware
🎯 Exploit Status
Requires local access and knowledge of triggering the vulnerable function path
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 6d9f07196389f35a3afebcf1a12c1425725caddd or 922f0e00017b09d9d47e3efac008c8b20ed546a0
Vendor Advisory: https://git.kernel.org/stable/c/6d9f07196389f35a3afebcf1a12c1425725caddd
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable AMD GPU driver
linuxPrevent loading of vulnerable amdgpu/amdkfd kernel modules
echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist.conf
echo 'blacklist amdkfd' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict local user access to systems with AMD GPUs
- Implement strict privilege separation and limit user permissions
🔍 How to Verify
Check if Vulnerable:
Check if system has AMD GPU and vulnerable kernel version. Run: lspci | grep -i amd && uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version contains fix commits. Check kernel changelog or git history for commits 6d9f07196389f35a3afebcf1a12c1425725caddd or 922f0e00017b09d9d47e3efac008c8b20ed546a0
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Stack overflow warnings in dmesg
- System crash/reboot events
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "stack overflow") AND process="kfd_get_cu_occupancy"