Skip to main content

CVE-2024-46772: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-46772cvecve-2024-46772
Published: Wed Sep 18 2024 (09/18/2024, 07:12:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check denominator crb_pipes before used [WHAT & HOW] A denominator cannot be 0, and is checked before used. This fixes 2 DIVIDE_BY_ZERO issues reported by Coverity.

AI-Powered Analysis

AILast updated: 06/29/2025, 01:26:47 UTC

Technical Analysis

CVE-2024-46772 is a recently disclosed vulnerability in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for AMD display drivers. The issue arises from improper validation of a denominator variable named 'crb_pipes' before its use in division operations. The vulnerability is characterized as a divide-by-zero error, which occurs when the denominator is zero and not properly checked, leading to potential kernel crashes or undefined behavior. This flaw was identified and fixed by adding a check to ensure the denominator is not zero before performing division, thereby preventing two distinct divide-by-zero conditions reported by the static analysis tool Coverity. The vulnerability affects certain versions of the Linux kernel identified by specific commit hashes, indicating it is present in recent kernel builds prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical in nature and relates to kernel-level graphics driver code, which is critical for system stability and security. Exploitation could lead to denial of service (system crash) or potentially escalate to privilege escalation if combined with other vulnerabilities, given the kernel-level context of the flaw.

Potential Impact

For European organizations, the impact of CVE-2024-46772 primarily involves system availability and stability risks. Since the vulnerability resides in the Linux kernel's AMD display driver, systems using affected Linux kernel versions with AMD graphics hardware are susceptible. A successful exploitation could cause kernel panics or crashes, resulting in denial of service conditions. This can disrupt business operations, especially in environments relying on Linux servers or workstations with AMD GPUs for critical tasks such as graphics rendering, virtualization, or compute workloads. While direct confidentiality or integrity breaches are less likely from this vulnerability alone, the resulting system instability could indirectly affect data availability and operational continuity. Organizations in sectors such as finance, manufacturing, research, and public administration that utilize Linux-based infrastructure with AMD hardware may face operational disruptions. Additionally, the lack of known exploits suggests a lower immediate threat, but the vulnerability should be addressed promptly to prevent future exploitation attempts, especially as threat actors often target kernel vulnerabilities for privilege escalation or denial of service.

Mitigation Recommendations

To mitigate CVE-2024-46772, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they are available from their distribution vendors or upstream Linux sources. 2) Identify and inventory systems running affected Linux kernel versions with AMD graphics hardware to prioritize patch deployment. 3) For environments where immediate patching is not feasible, consider temporary workarounds such as disabling AMD DRM modules if graphics functionality is not critical, to reduce attack surface. 4) Monitor system logs and kernel messages for signs of crashes or unusual behavior that could indicate attempted exploitation. 5) Employ kernel hardening techniques and security modules (e.g., SELinux, AppArmor) to limit the impact of potential kernel-level exploits. 6) Maintain robust backup and recovery procedures to minimize downtime in case of denial of service incidents. 7) Stay informed on updates from Linux kernel maintainers and security advisories for any emerging exploit reports or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.274Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe1253

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 1:26:47 AM

Last updated: 8/12/2025, 1:34:19 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats