CVE-2024-47664: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware If the value of max_speed_hz is 0, it may cause a division by zero error in hisi_calc_effective_speed(). The value of max_speed_hz is provided by firmware. Firmware is generally considered as a trusted domain. However, as division by zero errors can cause system failure, for defense measure, the value of max_speed is validated here. So 0 is regarded as invalid and an error code is returned.
AI Analysis
Technical Summary
CVE-2024-47664 is a vulnerability identified in the Linux kernel specifically related to the SPI (Serial Peripheral Interface) driver for the HiSilicon Kunpeng platform. The issue arises from the handling of the max_speed_hz parameter, which is provided by the system firmware and represents the maximum SPI clock frequency. If this value is set to zero, it leads to a division by zero error in the function hisi_calc_effective_speed(). Since firmware is generally trusted, this value was previously not validated, allowing a zero value to cause a runtime error. This division by zero can cause the affected system to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability was addressed by adding validation logic to reject zero values for max_speed_hz, returning an error code instead of proceeding with the calculation. This fix prevents the division by zero and improves the robustness of the SPI driver against malformed or malicious firmware inputs. The vulnerability affects specific Linux kernel versions containing the vulnerable commit (c770d8631e1810d8f1ce21b18ad5dd67eeb39e5c) and was published on October 9, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of system instability or denial of service on Linux systems running on HiSilicon Kunpeng hardware or similar platforms using the affected SPI driver. Such systems are often found in data centers, telecommunications infrastructure, and enterprise servers. A successful exploitation could disrupt critical services by causing kernel crashes or reboots, impacting availability. Although the vulnerability does not directly expose confidentiality or integrity risks, the resulting downtime could affect business operations, especially in sectors relying on high availability such as finance, healthcare, and public services. Since the vulnerability depends on firmware-provided values, exploitation would require either compromised firmware or an attacker capable of influencing firmware parameters, which is a higher bar than typical remote exploits. However, organizations using Kunpeng-based Linux servers should be aware of the risk and apply patches promptly to prevent potential denial of service scenarios.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch validating max_speed_hz to reject zero values, thereby preventing the division by zero error. 2. Verify and update firmware on affected hardware to ensure it does not provide invalid max_speed_hz values. 3. Implement monitoring for kernel crashes or unusual SPI driver errors that could indicate attempts to exploit this vulnerability. 4. Restrict firmware update processes to trusted personnel and secure supply chains to prevent malicious firmware modifications. 5. For critical systems, consider implementing kernel live patching solutions to minimize downtime during patch deployment. 6. Conduct regular security audits and vulnerability scans focusing on kernel and firmware integrity on Kunpeng-based Linux systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-47664: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware If the value of max_speed_hz is 0, it may cause a division by zero error in hisi_calc_effective_speed(). The value of max_speed_hz is provided by firmware. Firmware is generally considered as a trusted domain. However, as division by zero errors can cause system failure, for defense measure, the value of max_speed is validated here. So 0 is regarded as invalid and an error code is returned.
AI-Powered Analysis
Technical Analysis
CVE-2024-47664 is a vulnerability identified in the Linux kernel specifically related to the SPI (Serial Peripheral Interface) driver for the HiSilicon Kunpeng platform. The issue arises from the handling of the max_speed_hz parameter, which is provided by the system firmware and represents the maximum SPI clock frequency. If this value is set to zero, it leads to a division by zero error in the function hisi_calc_effective_speed(). Since firmware is generally trusted, this value was previously not validated, allowing a zero value to cause a runtime error. This division by zero can cause the affected system to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability was addressed by adding validation logic to reject zero values for max_speed_hz, returning an error code instead of proceeding with the calculation. This fix prevents the division by zero and improves the robustness of the SPI driver against malformed or malicious firmware inputs. The vulnerability affects specific Linux kernel versions containing the vulnerable commit (c770d8631e1810d8f1ce21b18ad5dd67eeb39e5c) and was published on October 9, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of system instability or denial of service on Linux systems running on HiSilicon Kunpeng hardware or similar platforms using the affected SPI driver. Such systems are often found in data centers, telecommunications infrastructure, and enterprise servers. A successful exploitation could disrupt critical services by causing kernel crashes or reboots, impacting availability. Although the vulnerability does not directly expose confidentiality or integrity risks, the resulting downtime could affect business operations, especially in sectors relying on high availability such as finance, healthcare, and public services. Since the vulnerability depends on firmware-provided values, exploitation would require either compromised firmware or an attacker capable of influencing firmware parameters, which is a higher bar than typical remote exploits. However, organizations using Kunpeng-based Linux servers should be aware of the risk and apply patches promptly to prevent potential denial of service scenarios.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch validating max_speed_hz to reject zero values, thereby preventing the division by zero error. 2. Verify and update firmware on affected hardware to ensure it does not provide invalid max_speed_hz values. 3. Implement monitoring for kernel crashes or unusual SPI driver errors that could indicate attempts to exploit this vulnerability. 4. Restrict firmware update processes to trusted personnel and secure supply chains to prevent malicious firmware modifications. 5. For critical systems, consider implementing kernel live patching solutions to minimize downtime during patch deployment. 6. Conduct regular security audits and vulnerability scans focusing on kernel and firmware integrity on Kunpeng-based Linux systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-30T16:00:12.936Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0441
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 7:12:04 PM
Last updated: 12/1/2025, 9:16:28 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
1st December – Threat Intelligence Report
MediumAustralian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights
MediumCVE-2025-13816: Path Traversal in moxi159753 Mogu Blog v2
MediumCVE-2025-13815: Unrestricted Upload in moxi159753 Mogu Blog v2
MediumCVE-2025-61619: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.