CVE-2024-56697

5.5 MEDIUM

📋 TL;DR

This CVE addresses a NULL pointer dereference vulnerability in the AMD GPU driver within the Linux kernel. An attacker could trigger a kernel panic or system crash by exploiting memory allocation failures. This affects Linux systems with AMD GPUs using the affected driver.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu)
Versions: Linux kernel versions containing the vulnerable amdgpu_discovery_get_nps_info() function before fixes
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD GPU hardware and the amdgpu driver to be loaded and in use.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service (system crash) with potential data loss or corruption.

🟠

Likely Case

System crash or instability requiring reboot, causing temporary service disruption.

🟢

If Mitigated

Minimal impact if proper kernel hardening and privilege separation are in place.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific GPU driver operations.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could crash systems with AMD GPUs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific GPU operations. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel commits: a1144da794adedb9447437c57d69add56494309d, d14bea4e094871226ea69772d69dab8b7b5f4915, e8f1dbaa0437eba4e8c1d6a6d81eca2e2ce3d197

Vendor Advisory: https://git.kernel.org/stable/c/a1144da794adedb9447437c57d69add56494309d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify amdgpu driver loads without errors.

🔧 Temporary Workarounds

Disable amdgpu driver

linux

Prevent loading of vulnerable AMD GPU driver module

echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD GPUs
  • Implement kernel hardening features like SELinux/AppArmor to limit driver operations

🔍 How to Verify

Check if Vulnerable:

Check if amdgpu module is loaded: lsmod | grep amdgpu AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and amdgpu module loads without crashes during GPU operations

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • amdgpu driver crash logs in dmesg
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "amdgpu")

🔗 References

📤 Share & Export