Skip to main content

CVE-2024-43899: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-43899cvecve-2024-43899
Published: Mon Aug 26 2024 (08/26/2024, 10:10:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null pointer deref in dcn20_resource.c Fixes a hang thats triggered when MPV is run on a DCN401 dGPU: mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all and then enabling fullscreen playback (double click on the video) The following calltrace will be seen: [ 181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 181.843997] #PF: supervisor instruction fetch in kernel mode [ 181.844003] #PF: error_code(0x0010) - not-present page [ 181.844009] PGD 0 P4D 0 [ 181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI [ 181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G W OE 6.5.0-41-generic #41~22.04.2-Ubuntu [ 181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018 [ 181.844044] RIP: 0010:0x0 [ 181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246 [ 181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004 [ 181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400 [ 181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c [ 181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8 [ 181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005 [ 181.844121] FS: 00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000 [ 181.844128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0 [ 181.844141] Call Trace: [ 181.844146] <TASK> [ 181.844153] ? show_regs+0x6d/0x80 [ 181.844167] ? __die+0x24/0x80 [ 181.844179] ? page_fault_oops+0x99/0x1b0 [ 181.844192] ? do_user_addr_fault+0x31d/0x6b0 [ 181.844204] ? exc_page_fault+0x83/0x1b0 [ 181.844216] ? asm_exc_page_fault+0x27/0x30 [ 181.844237] dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu] [ 181.845115] amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu] [ 181.845985] amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu] [ 181.846848] fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu] [ 181.847734] fill_dc_plane_attributes+0x162/0x350 [amdgpu] [ 181.848748] dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.849791] ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu] [ 181.850840] amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]

AI-Powered Analysis

AILast updated: 06/28/2025, 22:27:42 UTC

Technical Analysis

CVE-2024-43899 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver component, related to the Direct Rendering Manager (DRM) subsystem. The flaw resides in the drm/amd/display code, particularly in the dcn20_resource.c file, which handles display resource management for AMD's DCN2.0 architecture GPUs. The vulnerability manifests as a null pointer dereference error triggered when running the MPV media player with hardware acceleration enabled (vaapi) on a DCN401 discrete GPU. The issue occurs during fullscreen playback, causing the kernel to attempt to access a null pointer, leading to a kernel panic or system hang. The provided kernel call trace shows a page fault in kernel mode due to a null pointer dereference in the amdgpu driver functions responsible for plane validation and display state updates. This bug results in a denial of service (DoS) condition by crashing or hanging the system when specific GPU-accelerated video playback operations are performed. The vulnerability affects Linux kernel versions incorporating the affected amdgpu driver code, and it has been patched in recent kernel updates. There is no evidence of exploitation in the wild at this time, and no CVSS score has been assigned yet. The root cause is a missing null pointer check in the display driver code path, which is triggered by particular hardware and software usage patterns involving MPV and AMD DCN401 GPUs. This vulnerability is primarily a stability and availability issue rather than a direct confidentiality or integrity compromise.

Potential Impact

For European organizations, this vulnerability poses a risk mainly to systems running Linux kernels with the affected AMD GPU drivers, particularly those using DCN401 discrete GPUs. Organizations relying on Linux-based workstations or servers for multimedia processing, video playback, or GPU-accelerated workloads could experience system crashes or hangs, leading to service interruptions or productivity loss. The denial of service caused by this flaw could affect media centers, digital signage, or any Linux system employing MPV or similar video players with hardware acceleration enabled. While it does not appear to allow privilege escalation or data leakage, the instability could disrupt critical operations, especially in environments where uptime and reliability are essential. The impact is more pronounced in sectors using AMD GPUs extensively, such as media production, scientific computing, or certain enterprise desktop deployments. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the bug, potentially causing operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions that include the patch fixing the null pointer dereference in the amdgpu driver. Kernel updates from major Linux distributions (e.g., Ubuntu, Debian, Fedora) should be applied promptly. If immediate kernel upgrades are not feasible, disabling hardware-accelerated video decoding in MPV or other media players when running on affected AMD GPUs can serve as a temporary workaround to avoid triggering the bug. System administrators should audit their environments to identify systems with DCN401 GPUs and MPV usage patterns that could expose the vulnerability. Additionally, monitoring kernel logs for signs of null pointer dereferences or system hangs related to amdgpu can help detect attempts to trigger the issue. Organizations should also consider isolating critical systems from untrusted users or applications that might exploit this flaw to cause denial of service. Finally, maintaining regular backups and ensuring rapid recovery procedures will help minimize operational impact if a system crash occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-17T09:11:59.291Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0c0b

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 10:27:42 PM

Last updated: 7/26/2025, 12:24:41 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats