Skip to main content

CVE-2024-47663: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-47663cvecve-2024-47663
Published: Wed Oct 09 2024 (10/09/2024, 14:13:56 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: staging: iio: frequency: ad9834: Validate frequency parameter value In ad9834_write_frequency() clk_get_rate() can return 0. In such case ad9834_calc_freqreg() call will lead to division by zero. Checking 'if (fout > (clk_freq / 2))' doesn't protect in case of 'fout' is 0. ad9834_write_frequency() is called from ad9834_write(), where fout is taken from text buffer, which can contain any value. Modify parameters checking. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/28/2025, 19:11:55 UTC

Technical Analysis

CVE-2024-47663 is a vulnerability identified in the Linux kernel, specifically within the staging driver for the Industrial I/O (IIO) subsystem handling the AD9834 frequency generator device. The flaw arises in the function ad9834_write_frequency(), where the kernel calls clk_get_rate() to retrieve the clock frequency. If clk_get_rate() returns zero, subsequent calculations in ad9834_calc_freqreg() lead to a division by zero error. The existing check 'if (fout > (clk_freq / 2))' does not prevent this because it does not handle the case when fout (the frequency output parameter) is zero. The fout value is sourced from a text buffer and can be manipulated to contain arbitrary values, including zero, which triggers the vulnerability. This can cause a kernel crash or undefined behavior due to the division by zero. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE). The issue affects specific Linux kernel versions identified by commit hashes, and a patch has been applied to improve parameter validation to prevent division by zero. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-47663 depends largely on their use of Linux systems running the affected kernel versions with the AD9834 frequency generator driver enabled. This vulnerability can lead to a denial of service (DoS) via kernel crash or instability, potentially disrupting critical systems that rely on precise frequency generation, such as industrial control systems, telecommunications infrastructure, or embedded devices in manufacturing environments. While exploitation does not appear to allow privilege escalation or arbitrary code execution, the resulting system instability could cause operational downtime, data loss, or interruption of services. Organizations in sectors like manufacturing, energy, telecommunications, and research institutions using specialized Linux-based hardware could be particularly affected. The vulnerability requires crafted input to the driver, which may require local access or specific conditions, limiting remote exploitation likelihood but still posing risks in multi-user or shared environments.

Mitigation Recommendations

European organizations should ensure that all Linux systems, especially those running kernel versions containing the affected AD9834 driver code, are updated promptly with the latest kernel patches that fix this vulnerability. Specifically, they should: 1) Identify systems using the AD9834 frequency generator driver and verify kernel versions against the affected commit hashes. 2) Apply vendor-provided kernel updates or backported patches that include the improved parameter validation in ad9834_write_frequency(). 3) Restrict access to interfaces that allow writing frequency parameters to trusted users only, minimizing the risk of malicious or accidental input. 4) Implement monitoring for kernel crashes or unusual behavior related to the IIO subsystem to detect potential exploitation attempts. 5) For embedded or specialized devices, coordinate with hardware vendors to obtain firmware or kernel updates addressing this issue. 6) Employ system integrity verification tools to detect unauthorized modifications or abnormal kernel behavior. These steps go beyond generic advice by focusing on the specific driver and usage context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.935Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0426

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 7:11:55 PM

Last updated: 8/15/2025, 3:45:48 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats