CVE-2024-46778: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check UnboundedRequestEnabled's value CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled is a pointer (i.e. dml_bool_t *UnboundedRequestEnabled), and thus if (p->UnboundedRequestEnabled) checks its address, not bool value. This fixes 1 REVERSE_INULL issue reported by Coverity.
AI Analysis
Technical Summary
CVE-2024-46778 is a vulnerability identified in the Linux kernel specifically within the AMD Direct Rendering Manager (DRM) display driver code. The issue arises from improper handling of a pointer variable named UnboundedRequestEnabled in the function CalculateSwathAndDETConfiguration_params_st. This variable is a pointer to a boolean type (dml_bool_t *), but the code incorrectly checks the pointer's address rather than the boolean value it points to. This logic flaw can lead to incorrect behavior in the display driver, potentially causing unexpected or undefined operations. The vulnerability was detected through static analysis (Coverity) and is classified as a REVERSE_INULL issue, indicating a reverse null pointer dereference or misuse. Although no known exploits are currently reported in the wild, the flaw could theoretically be leveraged to cause denial of service or other unintended side effects in the Linux kernel's AMD display subsystem. The vulnerability affects specific Linux kernel versions identified by the commit hash 7966f319c66d9468623c6a6a017ecbc0dd79be75. The patch corrects the logic by properly dereferencing the pointer to check the boolean value, ensuring stable and secure operation of the AMD DRM display driver.
Potential Impact
For European organizations, the impact of CVE-2024-46778 depends largely on their use of Linux systems with AMD graphics hardware, particularly those running affected kernel versions. The vulnerability could lead to system instability or crashes in environments relying on AMD GPU acceleration, affecting availability of critical services or user productivity. Organizations in sectors such as finance, manufacturing, research, and government that deploy Linux-based workstations or servers with AMD GPUs may experience disruptions. Although there is no evidence of active exploitation, the flaw could be targeted by attackers aiming to cause denial of service or to destabilize systems as part of a broader attack chain. Given the kernel-level nature of the vulnerability, successful exploitation could impact system integrity and availability but is unlikely to directly compromise confidentiality. The absence of known exploits and the requirement for specific hardware and kernel versions reduce the immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-46778. Specifically, they should identify systems running the affected kernel commit (7966f319c66d9468623c6a6a017ecbc0dd79be75) and upgrade to the latest stable kernel releases provided by their Linux distribution vendors. For environments where immediate patching is not feasible, organizations can consider temporarily disabling AMD GPU acceleration or using alternative drivers if supported, to mitigate risk. Additionally, monitoring system logs for unusual crashes or display driver errors can help detect potential exploitation attempts. Incorporating this vulnerability into vulnerability management and patching workflows, and ensuring that static analysis tools like Coverity are used in development pipelines, can prevent similar issues. Finally, organizations should maintain robust endpoint protection and incident response capabilities to quickly address any emerging threats related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-46778: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check UnboundedRequestEnabled's value CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled is a pointer (i.e. dml_bool_t *UnboundedRequestEnabled), and thus if (p->UnboundedRequestEnabled) checks its address, not bool value. This fixes 1 REVERSE_INULL issue reported by Coverity.
AI-Powered Analysis
Technical Analysis
CVE-2024-46778 is a vulnerability identified in the Linux kernel specifically within the AMD Direct Rendering Manager (DRM) display driver code. The issue arises from improper handling of a pointer variable named UnboundedRequestEnabled in the function CalculateSwathAndDETConfiguration_params_st. This variable is a pointer to a boolean type (dml_bool_t *), but the code incorrectly checks the pointer's address rather than the boolean value it points to. This logic flaw can lead to incorrect behavior in the display driver, potentially causing unexpected or undefined operations. The vulnerability was detected through static analysis (Coverity) and is classified as a REVERSE_INULL issue, indicating a reverse null pointer dereference or misuse. Although no known exploits are currently reported in the wild, the flaw could theoretically be leveraged to cause denial of service or other unintended side effects in the Linux kernel's AMD display subsystem. The vulnerability affects specific Linux kernel versions identified by the commit hash 7966f319c66d9468623c6a6a017ecbc0dd79be75. The patch corrects the logic by properly dereferencing the pointer to check the boolean value, ensuring stable and secure operation of the AMD DRM display driver.
Potential Impact
For European organizations, the impact of CVE-2024-46778 depends largely on their use of Linux systems with AMD graphics hardware, particularly those running affected kernel versions. The vulnerability could lead to system instability or crashes in environments relying on AMD GPU acceleration, affecting availability of critical services or user productivity. Organizations in sectors such as finance, manufacturing, research, and government that deploy Linux-based workstations or servers with AMD GPUs may experience disruptions. Although there is no evidence of active exploitation, the flaw could be targeted by attackers aiming to cause denial of service or to destabilize systems as part of a broader attack chain. Given the kernel-level nature of the vulnerability, successful exploitation could impact system integrity and availability but is unlikely to directly compromise confidentiality. The absence of known exploits and the requirement for specific hardware and kernel versions reduce the immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-46778. Specifically, they should identify systems running the affected kernel commit (7966f319c66d9468623c6a6a017ecbc0dd79be75) and upgrade to the latest stable kernel releases provided by their Linux distribution vendors. For environments where immediate patching is not feasible, organizations can consider temporarily disabling AMD GPU acceleration or using alternative drivers if supported, to mitigate risk. Additionally, monitoring system logs for unusual crashes or display driver errors can help detect potential exploitation attempts. Incorporating this vulnerability into vulnerability management and patching workflows, and ensuring that static analysis tools like Coverity are used in development pipelines, can prevent similar issues. Finally, organizations should maintain robust endpoint protection and incident response capabilities to quickly address any emerging threats related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.275Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe12a4
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 1:40:22 AM
Last updated: 8/12/2025, 4:02:01 AM
Views: 12
Related Threats
CVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
CriticalCVE-2025-8491: CWE-352 Cross-Site Request Forgery (CSRF) in nikelschubert Easy restaurant menu manager
MediumCVE-2025-0818: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ninjateam File Manager Pro – Filester
MediumCVE-2025-8901: Out of bounds write in Google Chrome
HighCVE-2025-8882: Use after free in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.