Skip to main content

CVE-2024-46811: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46811cvecve-2024-46811
Published: Fri Sep 27 2024 (09/27/2024, 12:35:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params->clk_table.entries is 8. [How] Assert if soc.num_states greater than 8.

AI-Powered Analysis

AILast updated: 06/28/2025, 18:12:06 UTC

Technical Analysis

CVE-2024-46811 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) AMD display driver component. The issue arises in the function fpu_update_bw_bounding_box, where an index used to access an array may exceed the array's bounds. The root cause is that the variable soc.num_states, which can be as high as 40, is used to index into bw_params->clk_table.entries, an array with only 8 entries. This discrepancy can lead to an out-of-bounds access, potentially causing memory corruption or kernel instability. The vulnerability was detected through static analysis (Coverity) flagged as an OVERRUN warning. The fix involves adding an assertion to ensure soc.num_states does not exceed 8, preventing the out-of-bounds indexing. Although no known exploits are currently reported in the wild, the vulnerability exists in the Linux kernel's AMD DRM driver, which is widely used in systems with AMD GPUs running Linux. The lack of a CVSS score suggests this is a recently disclosed issue, and the patch is likely available in recent kernel updates. This vulnerability is a classic example of a bounds-checking error that could be leveraged for denial of service or potentially privilege escalation if exploited carefully, given the kernel-level context of the flaw.

Potential Impact

For European organizations, the impact of CVE-2024-46811 depends largely on the deployment of Linux systems using AMD GPUs with the affected DRM driver. Organizations running Linux servers, workstations, or embedded systems with AMD graphics hardware could face risks of system crashes or kernel panics due to out-of-bounds memory access. In worst-case scenarios, attackers with local access might exploit this vulnerability to escalate privileges or cause denial of service, disrupting critical services. Given the kernel-level nature of the vulnerability, successful exploitation could compromise system integrity and availability. Industries relying on Linux-based infrastructure for high-performance computing, cloud services, or embedded devices (e.g., telecommunications, manufacturing, research institutions) in Europe may be particularly sensitive. However, the absence of known exploits and the requirement for local code execution or user interaction to trigger the flaw somewhat limits immediate risk. Still, the vulnerability should be addressed promptly to maintain system security and stability.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions that include the patch for CVE-2024-46811. Specifically, ensure that the Linux kernel version in use incorporates the fix that asserts soc.num_states does not exceed 8 in the AMD DRM driver. System administrators should audit their environments to identify systems running AMD GPUs with Linux and verify kernel versions. For environments where immediate patching is not feasible, consider restricting access to systems to trusted users only and monitoring for unusual kernel crashes or instability that could indicate exploitation attempts. Additionally, organizations should implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enable security modules like SELinux or AppArmor to reduce exploitation risk. Regularly review vendor advisories and subscribe to Linux kernel security mailing lists to stay informed about updates. Finally, conduct internal testing of the updated kernel in staging environments before wide deployment to ensure compatibility and stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.283Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe01c8

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:12:06 PM

Last updated: 8/17/2025, 7:08:05 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats