Skip to main content

CVE-2024-46699: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-46699cvecve-2024-46699
Published: Fri Sep 13 2024 (09/13/2024, 05:29:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Disable preemption while updating GPU stats We forgot to disable preemption around the write_seqcount_begin/end() pair while updating GPU stats: [ ] WARNING: CPU: 2 PID: 12 at include/linux/seqlock.h:221 __seqprop_assert.isra.0+0x128/0x150 [v3d] [ ] Workqueue: v3d_bin drm_sched_run_job_work [gpu_sched] <...snip...> [ ] Call trace: [ ] __seqprop_assert.isra.0+0x128/0x150 [v3d] [ ] v3d_job_start_stats.isra.0+0x90/0x218 [v3d] [ ] v3d_bin_job_run+0x23c/0x388 [v3d] [ ] drm_sched_run_job_work+0x520/0x6d0 [gpu_sched] [ ] process_one_work+0x62c/0xb48 [ ] worker_thread+0x468/0x5b0 [ ] kthread+0x1c4/0x1e0 [ ] ret_from_fork+0x10/0x20 Fix it.

AI-Powered Analysis

AILast updated: 06/29/2025, 00:26:13 UTC

Technical Analysis

CVE-2024-46699 is a vulnerability identified in the Linux kernel, specifically within the drm/v3d driver component responsible for managing GPU statistics updates. The issue arises because preemption was not disabled during the critical section where GPU statistics are updated using the write_seqcount_begin/end() pair. This omission can lead to concurrency issues, as the Linux kernel's preemption mechanism allows the scheduler to interrupt the current task and switch to another, potentially causing inconsistent or corrupted GPU stats data. The vulnerability manifests as a warning triggered by the __seqprop_assert function, indicating a sequence count property assertion failure. The call trace shows that this occurs during the execution of GPU job scheduling and workqueue processing, which are critical for GPU task management. The root cause is a missing preemption disablement around the sequence lock update, which is essential to maintain data integrity in concurrent environments. This flaw could lead to kernel warnings, instability, or potentially more severe consequences if exploited, such as denial of service or unpredictable GPU behavior. The vulnerability affects specific Linux kernel versions identified by commit hashes, and a fix has been implemented to disable preemption appropriately during the GPU stats update process. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations relying on Linux-based systems, especially those utilizing the drm/v3d driver for GPU management (common in embedded systems, ARM-based devices, and certain workstation environments), this vulnerability could impact system stability and reliability. Potential impacts include kernel warnings leading to system log flooding, performance degradation, or in worst cases, system crashes or denial of service if the GPU scheduler fails. Organizations in sectors such as telecommunications, automotive, industrial control, and research institutions using Linux with GPU acceleration might experience operational disruptions. Although no active exploits are known, the vulnerability could be leveraged by attackers with local access to induce instability or denial of service, affecting availability. Confidentiality and integrity impacts are less direct but cannot be fully ruled out if the flaw is chained with other vulnerabilities. Given the kernel-level nature of the issue, affected systems may require careful patching and testing to avoid regressions.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the patch for CVE-2024-46699. Since the vulnerability involves kernel preemption and GPU driver internals, applying vendor-provided kernel updates or mainline kernel patches is the most effective mitigation. For environments where immediate patching is challenging, organizations should restrict untrusted local user access to systems running vulnerable kernels to reduce exploitation risk. Monitoring system logs for __seqprop_assert warnings or unusual GPU scheduler errors can help detect attempts to trigger the flaw. Additionally, organizations should review their GPU workload scheduling policies and consider isolating critical GPU tasks to minimize impact. For embedded or specialized devices, coordination with hardware vendors for firmware or kernel updates is essential. Finally, maintain robust backup and recovery procedures to mitigate potential availability impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.250Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0ffe

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 12:26:13 AM

Last updated: 8/12/2025, 1:50:10 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats