Skip to main content

CVE-2024-46729: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46729cvecve-2024-46729
Published: Wed Sep 18 2024 (09/18/2024, 06:32:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix incorrect size calculation for loop [WHY] fe_clk_en has size of 5 but sizeof(fe_clk_en) has byte size 20 which is lager than the array size. [HOW] Divide byte size 20 by its element size. This fixes 2 OVERRUN issues reported by Coverity.

AI-Powered Analysis

AILast updated: 06/29/2025, 00:56:13 UTC

Technical Analysis

CVE-2024-46729 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD display drivers. The issue stems from an incorrect size calculation related to the 'fe_clk_en' array. The array 'fe_clk_en' is defined with a size of 5 elements, but the code erroneously uses sizeof(fe_clk_en) which returns the total byte size (20 bytes) rather than the number of elements. This miscalculation leads to buffer overruns when the code assumes a larger array size than actually allocated. The vulnerability was detected through static analysis tools (Coverity) and involves two overrun issues. The fix involves correcting the size calculation by dividing the total byte size by the size of each element to accurately determine the array length. This vulnerability could potentially lead to memory corruption within the kernel's AMD display driver module, which might be exploited to cause system instability, crashes, or potentially privilege escalation if an attacker can manipulate the affected code path. However, there are no known exploits in the wild at the time of publication, and the vulnerability requires local code execution within the kernel context. The affected versions are identified by specific commit hashes, indicating that this is a recent and targeted fix in the Linux kernel source code. No CVSS score has been assigned yet, but the issue is recognized and published by the Linux project and CISA has enriched the data, indicating its relevance and need for attention.

Potential Impact

For European organizations, the impact of CVE-2024-46729 depends largely on their use of Linux systems with AMD graphics hardware, particularly those running kernel versions prior to the patch. Organizations relying on Linux servers, workstations, or embedded systems with AMD display drivers could face risks of system instability or denial of service due to kernel memory corruption. In environments where Linux is used for critical infrastructure, such as telecommunications, finance, or government services, exploitation could lead to operational disruptions. Although no exploits are currently known, the vulnerability could be leveraged in targeted attacks to escalate privileges or cause kernel panics, especially if combined with other vulnerabilities. The risk is higher in environments where untrusted users have local access or where containerized or virtualized workloads share kernel resources. Given the widespread use of Linux in European data centers and enterprises, the vulnerability warrants prompt attention to avoid potential exploitation that could affect confidentiality, integrity, and availability of systems.

Mitigation Recommendations

European organizations should immediately review their Linux kernel versions and apply the latest patches that address CVE-2024-46729. Specifically, updating to the fixed kernel versions containing the corrected size calculation in the AMD DRM driver is critical. Organizations should also audit systems with AMD graphics hardware to identify vulnerable hosts. For environments where immediate patching is not feasible, consider restricting local user access and implementing kernel lockdown features to reduce the risk of exploitation. Monitoring kernel logs for unusual behavior or crashes related to the DRM subsystem can provide early detection of exploitation attempts. Additionally, organizations should ensure that their vulnerability management processes include tracking Linux kernel updates and deploying them in a timely manner. Employing security tools that detect memory corruption or kernel anomalies can further enhance defense. Finally, coordinate with hardware vendors and Linux distribution maintainers to confirm that all relevant patches are applied in custom or embedded Linux deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.256Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe1110

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 12:56:13 AM

Last updated: 7/30/2025, 5:29:57 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats