CVE-2024-26647: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' In link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc' was dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc' NULL pointer check. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)
AI Analysis
Technical Summary
CVE-2024-26647 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver code related to the display subsystem. The flaw exists in the function link_set_dsc_pps_packet(), which is responsible for handling Display Stream Compression (DSC) packets in the AMD display driver. The vulnerability arises because a pointer to a 'display_stream_compressor' structure (dsc) is dereferenced before a null pointer check is performed. Specifically, the code attempts to initialize a logger context using dsc->ctx->logger without first verifying that 'dsc' is not null. This can lead to a null pointer dereference, causing a kernel warning or potentially a kernel panic, resulting in a denial of service (DoS) condition. The issue was fixed by reordering the checks to ensure the pointer is validated before dereferencing. The vulnerability affects certain versions of the Linux kernel containing the affected AMD GPU driver code. There is no indication of known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability is a classic example of improper pointer validation leading to potential system instability or crashes in the kernel space, which can be exploited by local users or processes interacting with the GPU driver to cause system disruption.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running affected Linux kernel versions with AMD GPU hardware. Organizations relying on Linux servers or workstations with AMD GPUs for critical workloads could experience unexpected system crashes or reboots, leading to service interruptions and potential data loss if unsaved work is lost during a kernel panic. While this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could disrupt operations, especially in environments with high availability requirements or where Linux systems are used for graphical workloads, such as design, engineering, or media production. The impact is more pronounced in sectors with heavy Linux adoption on AMD hardware, including research institutions, media companies, and enterprises using AMD-based Linux servers. Since no known exploits exist yet, the immediate risk is moderate, but the potential for future exploitation or accidental triggering remains a concern.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly update their Linux kernels to versions where this issue has been patched. Kernel updates containing the fix for CVE-2024-26647 should be prioritized, especially on systems with AMD GPUs. System administrators should verify the kernel version and AMD GPU driver status and apply vendor-supplied patches or mainline kernel updates as soon as they become available. Additionally, organizations should implement robust monitoring to detect kernel warnings or crashes related to GPU drivers, enabling rapid response to any instability. For critical systems, consider temporarily disabling or limiting GPU-intensive workloads until patches are applied. Testing updates in staging environments before production deployment is recommended to ensure stability. Finally, maintaining a comprehensive asset inventory to identify affected systems will help prioritize remediation efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-26647: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' In link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc' was dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc' NULL pointer check. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)
AI-Powered Analysis
Technical Analysis
CVE-2024-26647 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver code related to the display subsystem. The flaw exists in the function link_set_dsc_pps_packet(), which is responsible for handling Display Stream Compression (DSC) packets in the AMD display driver. The vulnerability arises because a pointer to a 'display_stream_compressor' structure (dsc) is dereferenced before a null pointer check is performed. Specifically, the code attempts to initialize a logger context using dsc->ctx->logger without first verifying that 'dsc' is not null. This can lead to a null pointer dereference, causing a kernel warning or potentially a kernel panic, resulting in a denial of service (DoS) condition. The issue was fixed by reordering the checks to ensure the pointer is validated before dereferencing. The vulnerability affects certain versions of the Linux kernel containing the affected AMD GPU driver code. There is no indication of known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability is a classic example of improper pointer validation leading to potential system instability or crashes in the kernel space, which can be exploited by local users or processes interacting with the GPU driver to cause system disruption.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running affected Linux kernel versions with AMD GPU hardware. Organizations relying on Linux servers or workstations with AMD GPUs for critical workloads could experience unexpected system crashes or reboots, leading to service interruptions and potential data loss if unsaved work is lost during a kernel panic. While this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could disrupt operations, especially in environments with high availability requirements or where Linux systems are used for graphical workloads, such as design, engineering, or media production. The impact is more pronounced in sectors with heavy Linux adoption on AMD hardware, including research institutions, media companies, and enterprises using AMD-based Linux servers. Since no known exploits exist yet, the immediate risk is moderate, but the potential for future exploitation or accidental triggering remains a concern.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly update their Linux kernels to versions where this issue has been patched. Kernel updates containing the fix for CVE-2024-26647 should be prioritized, especially on systems with AMD GPUs. System administrators should verify the kernel version and AMD GPU driver status and apply vendor-supplied patches or mainline kernel updates as soon as they become available. Additionally, organizations should implement robust monitoring to detect kernel warnings or crashes related to GPU drivers, enabling rapid response to any instability. For critical systems, consider temporarily disabling or limiting GPU-intensive workloads until patches are applied. Testing updates in staging environments before production deployment is recommended to ensure stability. Finally, maintaining a comprehensive asset inventory to identify affected systems will help prioritize remediation efforts effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.138Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aebfbb
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 5:43:33 AM
Last updated: 7/31/2025, 10:51:33 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.