Skip to main content

CVE-2024-47704: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-47704cvecve-2024-47704
Published: Mon Oct 21 2024 (10/21/2024, 11:53:39 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_res->hpo_dp_link_enc before using it [WHAT & HOW] Functions dp_enable_link_phy and dp_disable_link_phy can pass link_res without initializing hpo_dp_link_enc and it is necessary to check for null before dereferencing. This fixes 2 FORWARD_NULL issues reported by Coverity.

AI-Powered Analysis

AILast updated: 06/28/2025, 19:42:28 UTC

Technical Analysis

CVE-2024-47704 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD display drivers. The issue arises in the functions dp_enable_link_phy and dp_disable_link_phy, which handle the enabling and disabling of the physical link layer for DisplayPort connections. These functions can pass a link_res structure without properly initializing the hpo_dp_link_enc member. The vulnerability is due to the lack of a null check before dereferencing this pointer, which can lead to a NULL pointer dereference (FORWARD_NULL) condition. This type of flaw can cause the kernel to crash or behave unpredictably, resulting in a denial of service (DoS) condition. The problem was identified through static analysis tools (Coverity) and fixed by adding appropriate null checks to prevent dereferencing uninitialized pointers. The vulnerability affects certain Linux kernel versions identified by specific commit hashes, indicating it is present in recent or development versions of the kernel prior to the patch. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability is primarily a stability and availability concern rather than a direct confidentiality or integrity risk, as it does not appear to allow privilege escalation or code execution. However, a kernel crash can disrupt services and user operations on affected systems.

Potential Impact

For European organizations, the impact of CVE-2024-47704 primarily concerns system availability and stability. Organizations relying on Linux systems with AMD graphics hardware, especially those using DisplayPort interfaces, may experience unexpected kernel crashes if the vulnerable code path is triggered. This could affect desktop environments, workstations, and servers that utilize AMD GPUs for graphical output or compute tasks. In sectors such as finance, healthcare, government, and critical infrastructure where Linux is widely deployed, such disruptions could lead to operational downtime, loss of productivity, and potential service interruptions. Although the vulnerability does not currently have known exploits, the risk of denial of service through kernel panics can be significant in environments requiring high availability. Additionally, organizations running custom or development kernel versions may be more exposed. The lack of a known exploit reduces immediate risk, but the presence of a kernel-level flaw means that attackers with local access could potentially leverage it to cause system instability.

Mitigation Recommendations

To mitigate CVE-2024-47704, European organizations should prioritize updating their Linux kernels to versions where this vulnerability has been patched. Since the issue is in the AMD DRM driver, organizations should ensure that their kernel packages are sourced from trusted repositories that have integrated the fix. For environments using custom kernels, developers must backport the patch that adds null checks before dereferencing hpo_dp_link_enc in dp_enable_link_phy and dp_disable_link_phy functions. Additionally, organizations should implement robust monitoring of system logs for kernel oops or panic messages related to DRM or DisplayPort subsystems to detect potential exploitation attempts or instability. Limiting local user access and enforcing strict privilege separation can reduce the risk of triggering this vulnerability. For critical systems, consider fallback or redundancy strategies to maintain availability in case of unexpected crashes. Finally, maintain awareness of updates from Linux kernel maintainers and AMD regarding further advisories or patches related to this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.946Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0560

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 7:42:28 PM

Last updated: 8/8/2025, 10:40:48 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats