Skip to main content

CVE-2024-36969: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-36969cvecve-2024-36969
Published: Sat Jun 08 2024 (06/08/2024, 12:53:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix division by zero in setup_dsc_config When slice_height is 0, the division by slice_height in the calculation of the number of slices will cause a division by zero driver crash. This leaves the kernel in a state that requires a reboot. This patch adds a check to avoid the division by zero. The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor connected via Thunderbolt. The amdgpu driver crashed with this exception when I rebooted the system with the monitor connected. kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) kernel: ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminator 2)) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1109) amdgpu After applying this patch, the driver no longer crashes when the monitor is connected and the system is rebooted. I believe this is the same issue reported for 3113.

AI-Powered Analysis

AILast updated: 06/29/2025, 10:54:30 UTC

Technical Analysis

CVE-2024-36969 is a vulnerability identified in the Linux kernel's AMD GPU driver, specifically within the drm/amd/display component responsible for handling display stream compression (DSC) configuration. The root cause is a division by zero error occurring in the function setup_dsc_config when the parameter slice_height is zero. This parameter is used in calculating the number of slices for DSC, and if it is zero, the division operation triggers a kernel crash. The crash results in the amdgpu driver failing and the kernel entering an unstable state that necessitates a system reboot to recover. The issue was reproduced on a Lenovo Thinkpad Z16 Gen 2 connected to an Apple Studio Display via Thunderbolt, where the crash occurred during system reboot with the monitor connected. The stack trace indicates the failure occurs deep within the amdgpu driver's DSC configuration code. The vulnerability does not appear to allow code execution or privilege escalation but causes a denial of service (DoS) by crashing the kernel. A patch has been released that adds a check to prevent division by zero, thereby stabilizing the driver and preventing the crash when the monitor is connected and the system reboots. No known exploits are reported in the wild, and no CVSS score has been assigned yet. This vulnerability affects Linux kernel versions prior to the patch and specifically impacts systems using AMD GPUs with DSC enabled and connected to certain monitors via Thunderbolt or similar interfaces.

Potential Impact

For European organizations, the primary impact of CVE-2024-36969 is a potential denial of service condition on Linux systems using AMD GPUs with DSC enabled. This could lead to unexpected kernel crashes and forced reboots, causing downtime and disruption of critical services, especially in environments relying on Linux workstations or servers with AMD graphics hardware. Organizations using high-end workstations for graphics-intensive tasks, such as media production, design, or scientific visualization, may be particularly affected. The disruption could impact productivity and availability of services. Although this vulnerability does not appear to compromise confidentiality or integrity directly, the forced reboots could interrupt business operations and lead to data loss if unsaved work is lost during crashes. Additionally, systems used in industrial control or embedded environments that rely on Linux with AMD GPUs could experience operational interruptions. Since the vulnerability requires specific hardware configurations and user interaction (reboot with monitor connected), the attack surface is somewhat limited but still relevant for affected setups.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patch that addresses CVE-2024-36969 to all affected systems running AMD GPUs with DSC support. This patch prevents the division by zero error and stabilizes the amdgpu driver. Organizations should audit their Linux systems to identify those with AMD GPUs and DSC enabled, especially workstations connected to external monitors via Thunderbolt or similar interfaces. Until patched, users should avoid rebooting systems with affected monitors connected to prevent triggering the crash. Monitoring kernel logs for amdgpu driver errors can help detect attempts to exploit or trigger the vulnerability. For critical systems, consider temporarily disabling DSC support in the amdgpu driver if feasible, to mitigate risk until patches are applied. Regularly update Linux kernel versions to incorporate security fixes. Additionally, implement robust backup and recovery procedures to minimize impact from unexpected reboots. Coordination with hardware vendors and IT support teams to validate hardware compatibility with patched kernels is recommended to ensure stability post-update.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.081Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2836

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 10:54:30 AM

Last updated: 8/7/2025, 6:48:34 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats