CVE-2024-57922: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add check for granularity in dml ceil/floor helpers [Why] Wrapper functions for dcn_bw_ceil2() and dcn_bw_floor2() should check for granularity is non zero to avoid assert and divide-by-zero error in dcn_bw_ functions. [How] Add check for granularity 0. (cherry picked from commit f6e09701c3eb2ccb8cb0518e0b67f1c69742a4ec)
AI Analysis
Technical Summary
CVE-2024-57922 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem related to AMD display drivers. The issue arises in the helper functions dcn_bw_ceil2() and dcn_bw_floor2(), which are used for bandwidth calculations in the Display Core Next (DCN) component. These wrapper functions lacked a proper check for the 'granularity' parameter being non-zero. Without this validation, if granularity is zero, it can lead to a divide-by-zero error or an assertion failure. This can cause the kernel to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability was addressed by adding a check to ensure granularity is not zero before performing calculations, preventing the divide-by-zero scenario. The affected versions are identified by a specific commit hash, indicating this is a recent and targeted fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability primarily impacts the stability and availability of systems running vulnerable Linux kernel versions with AMD DRM components enabled.
Potential Impact
For European organizations, the primary impact of CVE-2024-57922 is on system availability and stability. Systems using Linux kernels with AMD graphics hardware and the affected DRM drivers could experience kernel panics or crashes if exploited, leading to service interruptions. This could affect servers, workstations, or embedded devices relying on AMD GPUs for display or compute tasks. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting denial of service could disrupt critical business operations, especially in sectors relying on high availability such as finance, healthcare, and manufacturing. Organizations using Linux-based infrastructure with AMD graphics in desktop environments or specialized hardware should be aware of potential disruptions. Since no known exploits exist yet, the risk is currently theoretical but should be mitigated proactively to avoid future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running AMD DRM drivers and verify kernel versions against the patched commit. 2) Apply the official Linux kernel patch that adds the granularity check as soon as it is available in their distribution's kernel updates. 3) For environments where immediate patching is not feasible, consider disabling or limiting the use of AMD DRM components if possible, or restrict access to affected systems to trusted users only. 4) Monitor system logs for kernel warnings or crashes related to DRM or display subsystems that could indicate attempts to trigger this vulnerability. 5) Engage with Linux distribution vendors to ensure timely updates and backports for enterprise kernels. 6) Incorporate this vulnerability into vulnerability management and patching cycles to maintain ongoing protection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-57922: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add check for granularity in dml ceil/floor helpers [Why] Wrapper functions for dcn_bw_ceil2() and dcn_bw_floor2() should check for granularity is non zero to avoid assert and divide-by-zero error in dcn_bw_ functions. [How] Add check for granularity 0. (cherry picked from commit f6e09701c3eb2ccb8cb0518e0b67f1c69742a4ec)
AI-Powered Analysis
Technical Analysis
CVE-2024-57922 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem related to AMD display drivers. The issue arises in the helper functions dcn_bw_ceil2() and dcn_bw_floor2(), which are used for bandwidth calculations in the Display Core Next (DCN) component. These wrapper functions lacked a proper check for the 'granularity' parameter being non-zero. Without this validation, if granularity is zero, it can lead to a divide-by-zero error or an assertion failure. This can cause the kernel to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability was addressed by adding a check to ensure granularity is not zero before performing calculations, preventing the divide-by-zero scenario. The affected versions are identified by a specific commit hash, indicating this is a recent and targeted fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability primarily impacts the stability and availability of systems running vulnerable Linux kernel versions with AMD DRM components enabled.
Potential Impact
For European organizations, the primary impact of CVE-2024-57922 is on system availability and stability. Systems using Linux kernels with AMD graphics hardware and the affected DRM drivers could experience kernel panics or crashes if exploited, leading to service interruptions. This could affect servers, workstations, or embedded devices relying on AMD GPUs for display or compute tasks. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting denial of service could disrupt critical business operations, especially in sectors relying on high availability such as finance, healthcare, and manufacturing. Organizations using Linux-based infrastructure with AMD graphics in desktop environments or specialized hardware should be aware of potential disruptions. Since no known exploits exist yet, the risk is currently theoretical but should be mitigated proactively to avoid future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running AMD DRM drivers and verify kernel versions against the patched commit. 2) Apply the official Linux kernel patch that adds the granularity check as soon as it is available in their distribution's kernel updates. 3) For environments where immediate patching is not feasible, consider disabling or limiting the use of AMD DRM components if possible, or restrict access to affected systems to trusted users only. 4) Monitor system logs for kernel warnings or crashes related to DRM or display subsystems that could indicate attempts to trigger this vulnerability. 5) Engage with Linux distribution vendors to ensure timely updates and backports for enterprise kernels. 6) Incorporate this vulnerability into vulnerability management and patching cycles to maintain ongoing protection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-19T11:50:08.375Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdea54
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 8:56:59 AM
Last updated: 8/12/2025, 12:47:38 AM
Views: 12
Related Threats
CVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.