CVE-2024-43899: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null pointer deref in dcn20_resource.c Fixes a hang thats triggered when MPV is run on a DCN401 dGPU: mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all and then enabling fullscreen playback (double click on the video) The following calltrace will be seen: [ 181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 181.843997] #PF: supervisor instruction fetch in kernel mode [ 181.844003] #PF: error_code(0x0010) - not-present page [ 181.844009] PGD 0 P4D 0 [ 181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI [ 181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G W OE 6.5.0-41-generic #41~22.04.2-Ubuntu [ 181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018 [ 181.844044] RIP: 0010:0x0 [ 181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246 [ 181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004 [ 181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400 [ 181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c [ 181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8 [ 181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005 [ 181.844121] FS: 00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000 [ 181.844128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0 [ 181.844141] Call Trace: [ 181.844146] <TASK> [ 181.844153] ? show_regs+0x6d/0x80 [ 181.844167] ? __die+0x24/0x80 [ 181.844179] ? page_fault_oops+0x99/0x1b0 [ 181.844192] ? do_user_addr_fault+0x31d/0x6b0 [ 181.844204] ? exc_page_fault+0x83/0x1b0 [ 181.844216] ? asm_exc_page_fault+0x27/0x30 [ 181.844237] dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu] [ 181.845115] amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu] [ 181.845985] amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu] [ 181.846848] fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu] [ 181.847734] fill_dc_plane_attributes+0x162/0x350 [amdgpu] [ 181.848748] dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.849791] ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.850840] amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]
AI Analysis
Technical Summary
CVE-2024-43899 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component, related to the Direct Rendering Manager (DRM) subsystem. The flaw resides in the drm/amd/display code, particularly in the dcn20_resource.c file, which handles display resource management for AMD's DCN2.0 architecture GPUs. The vulnerability manifests as a null pointer dereference error triggered when running the MPV media player with hardware acceleration enabled (vaapi) on a DCN401 discrete GPU. The issue occurs during fullscreen playback, causing the kernel to attempt to access a null pointer, leading to a kernel panic or system hang. The provided kernel call trace shows a page fault in kernel mode due to a null pointer dereference in the amdgpu driver functions responsible for plane validation and display state updates. This bug results in a denial of service (DoS) condition by crashing or hanging the system when specific GPU-accelerated video playback operations are performed. The vulnerability affects Linux kernel versions incorporating the affected amdgpu driver code, and it has been patched in recent kernel updates. There is no evidence of exploitation in the wild at this time, and no CVSS score has been assigned yet. The root cause is a missing null pointer check in the display driver code path, which is triggered by particular hardware and software usage patterns involving MPV and AMD DCN401 GPUs. This vulnerability is primarily a stability and availability issue rather than a direct confidentiality or integrity compromise.
Potential Impact
For European organizations, this vulnerability poses a risk mainly to systems running Linux kernels with the affected AMD GPU drivers, particularly those using DCN401 discrete GPUs. Organizations relying on Linux-based workstations or servers for multimedia processing, video playback, or GPU-accelerated workloads could experience system crashes or hangs, leading to service interruptions or productivity loss. The denial of service caused by this flaw could affect media centers, digital signage, or any Linux system employing MPV or similar video players with hardware acceleration enabled. While it does not appear to allow privilege escalation or data leakage, the instability could disrupt critical operations, especially in environments where uptime and reliability are essential. The impact is more pronounced in sectors using AMD GPUs extensively, such as media production, scientific computing, or certain enterprise desktop deployments. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the bug, potentially causing operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions that include the patch fixing the null pointer dereference in the amdgpu driver. Kernel updates from major Linux distributions (e.g., Ubuntu, Debian, Fedora) should be applied promptly. If immediate kernel upgrades are not feasible, disabling hardware-accelerated video decoding in MPV or other media players when running on affected AMD GPUs can serve as a temporary workaround to avoid triggering the bug. System administrators should audit their environments to identify systems with DCN401 GPUs and MPV usage patterns that could expose the vulnerability. Additionally, monitoring kernel logs for signs of null pointer dereferences or system hangs related to amdgpu can help detect attempts to trigger the issue. Organizations should also consider isolating critical systems from untrusted users or applications that might exploit this flaw to cause denial of service. Finally, maintaining regular backups and ensuring rapid recovery procedures will help minimize operational impact if a system crash occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-43899: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null pointer deref in dcn20_resource.c Fixes a hang thats triggered when MPV is run on a DCN401 dGPU: mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all and then enabling fullscreen playback (double click on the video) The following calltrace will be seen: [ 181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 181.843997] #PF: supervisor instruction fetch in kernel mode [ 181.844003] #PF: error_code(0x0010) - not-present page [ 181.844009] PGD 0 P4D 0 [ 181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI [ 181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G W OE 6.5.0-41-generic #41~22.04.2-Ubuntu [ 181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018 [ 181.844044] RIP: 0010:0x0 [ 181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246 [ 181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004 [ 181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400 [ 181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c [ 181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8 [ 181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005 [ 181.844121] FS: 00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000 [ 181.844128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0 [ 181.844141] Call Trace: [ 181.844146] <TASK> [ 181.844153] ? show_regs+0x6d/0x80 [ 181.844167] ? __die+0x24/0x80 [ 181.844179] ? page_fault_oops+0x99/0x1b0 [ 181.844192] ? do_user_addr_fault+0x31d/0x6b0 [ 181.844204] ? exc_page_fault+0x83/0x1b0 [ 181.844216] ? asm_exc_page_fault+0x27/0x30 [ 181.844237] dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu] [ 181.845115] amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu] [ 181.845985] amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu] [ 181.846848] fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu] [ 181.847734] fill_dc_plane_attributes+0x162/0x350 [amdgpu] [ 181.848748] dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.849791] ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.850840] amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]
AI-Powered Analysis
Technical Analysis
CVE-2024-43899 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component, related to the Direct Rendering Manager (DRM) subsystem. The flaw resides in the drm/amd/display code, particularly in the dcn20_resource.c file, which handles display resource management for AMD's DCN2.0 architecture GPUs. The vulnerability manifests as a null pointer dereference error triggered when running the MPV media player with hardware acceleration enabled (vaapi) on a DCN401 discrete GPU. The issue occurs during fullscreen playback, causing the kernel to attempt to access a null pointer, leading to a kernel panic or system hang. The provided kernel call trace shows a page fault in kernel mode due to a null pointer dereference in the amdgpu driver functions responsible for plane validation and display state updates. This bug results in a denial of service (DoS) condition by crashing or hanging the system when specific GPU-accelerated video playback operations are performed. The vulnerability affects Linux kernel versions incorporating the affected amdgpu driver code, and it has been patched in recent kernel updates. There is no evidence of exploitation in the wild at this time, and no CVSS score has been assigned yet. The root cause is a missing null pointer check in the display driver code path, which is triggered by particular hardware and software usage patterns involving MPV and AMD DCN401 GPUs. This vulnerability is primarily a stability and availability issue rather than a direct confidentiality or integrity compromise.
Potential Impact
For European organizations, this vulnerability poses a risk mainly to systems running Linux kernels with the affected AMD GPU drivers, particularly those using DCN401 discrete GPUs. Organizations relying on Linux-based workstations or servers for multimedia processing, video playback, or GPU-accelerated workloads could experience system crashes or hangs, leading to service interruptions or productivity loss. The denial of service caused by this flaw could affect media centers, digital signage, or any Linux system employing MPV or similar video players with hardware acceleration enabled. While it does not appear to allow privilege escalation or data leakage, the instability could disrupt critical operations, especially in environments where uptime and reliability are essential. The impact is more pronounced in sectors using AMD GPUs extensively, such as media production, scientific computing, or certain enterprise desktop deployments. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the bug, potentially causing operational disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions that include the patch fixing the null pointer dereference in the amdgpu driver. Kernel updates from major Linux distributions (e.g., Ubuntu, Debian, Fedora) should be applied promptly. If immediate kernel upgrades are not feasible, disabling hardware-accelerated video decoding in MPV or other media players when running on affected AMD GPUs can serve as a temporary workaround to avoid triggering the bug. System administrators should audit their environments to identify systems with DCN401 GPUs and MPV usage patterns that could expose the vulnerability. Additionally, monitoring kernel logs for signs of null pointer dereferences or system hangs related to amdgpu can help detect attempts to trigger the issue. Organizations should also consider isolating critical systems from untrusted users or applications that might exploit this flaw to cause denial of service. Finally, maintaining regular backups and ensuring rapid recovery procedures will help minimize operational impact if a system crash occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-17T09:11:59.291Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe0c0b
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/28/2025, 10:27:42 PM
Last updated: 7/26/2025, 12:24:41 AM
Views: 10
Related Threats
CVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.