Skip to main content

CVE-2024-27041: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-27041cvecve-2024-27041
Published: Wed May 01 2024 (05/01/2024, 12:54:04 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix NULL checks for adev->dm.dc in amdgpu_dm_fini() Since 'adev->dm.dc' in amdgpu_dm_fini() might turn out to be NULL before the call to dc_enable_dmub_notifications(), check beforehand to ensure there will not be a possible NULL-ptr-deref there. Also, since commit 1e88eb1b2c25 ("drm/amd/display: Drop CONFIG_DRM_AMD_DC_HDCP") there are two separate checks for NULL in 'adev->dm.dc' before dc_deinit_callbacks() and dc_dmub_srv_destroy(). Clean up by combining them all under one 'if'. Found by Linux Verification Center (linuxtesting.org) with static analysis tool SVACE.

AI-Powered Analysis

AILast updated: 06/29/2025, 14:41:17 UTC

Technical Analysis

CVE-2024-27041 is a medium-severity vulnerability identified in the Linux kernel's AMD GPU display driver subsystem, specifically within the amdgpu_dm_fini() function. The issue arises due to insufficient NULL pointer checks on the 'adev->dm.dc' pointer before it is dereferenced in the function dc_enable_dmub_notifications(). If 'adev->dm.dc' is NULL, dereferencing it leads to a NULL pointer dereference (CWE-476), which can cause a kernel crash (denial of service). The vulnerability was discovered through static analysis by the Linux Verification Center using the SVACE tool. The patch involves consolidating multiple NULL checks for 'adev->dm.dc' to ensure that no NULL pointer dereference occurs during the cleanup and deinitialization routines of the AMD GPU display manager. The affected versions correspond to specific Linux kernel commits prior to the fix. The CVSS v3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low complexity, requiring low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability due to potential kernel crashes. No known exploits are reported in the wild at this time.

Potential Impact

For European organizations, the primary impact of CVE-2024-27041 is the risk of local denial of service on Linux systems running AMD GPUs with the affected kernel versions. This could disrupt critical services, especially in environments relying on Linux servers or workstations with AMD graphics hardware for graphical processing or compute tasks. While the vulnerability does not allow for privilege escalation or data compromise, the availability impact could affect operational continuity, particularly in sectors like finance, manufacturing, research, and public services where Linux is prevalent. Systems used in graphical or compute-intensive roles may experience unexpected crashes, leading to downtime and potential loss of productivity. Since exploitation requires local access with low privileges, insider threats or attackers who have gained limited access could trigger the issue. The absence of user interaction simplifies exploitation once local access is obtained. Given the widespread use of Linux across European enterprises and public institutions, the vulnerability warrants timely patching to maintain system stability and service availability.

Mitigation Recommendations

1. Immediate application of the official Linux kernel patches that address CVE-2024-27041 is the most effective mitigation. Organizations should update to the latest stable kernel versions containing the fix. 2. For environments where immediate patching is not feasible, restrict local access to trusted users only, employing strict access controls and monitoring to prevent unauthorized local execution. 3. Implement kernel crash monitoring and alerting to detect and respond rapidly to any unexpected system crashes potentially related to this vulnerability. 4. In virtualized or containerized environments, isolate workloads using AMD GPUs to minimize the blast radius of potential crashes. 5. Review and harden privilege management policies to reduce the number of users with local access and low privileges that could exploit this issue. 6. Maintain up-to-date inventory of Linux systems with AMD GPUs to prioritize patch deployment. 7. Engage with Linux distribution vendors for backported patches if using long-term support kernels. 8. Conduct regular security audits and vulnerability scans to detect unpatched systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.212Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe31a3

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 2:41:17 PM

Last updated: 7/27/2025, 5:48:33 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats