CVE-2024-46724
📋 TL;DR
This CVE-2024-46724 is an out-of-bounds read vulnerability in the AMD GPU driver within the Linux kernel. It allows attackers to read kernel memory beyond allocated bounds, potentially leaking sensitive information or causing system instability. Systems using AMD GPUs with affected Linux kernel versions are vulnerable.
💻 Affected Systems
- Linux kernel with AMD GPU driver (drm/amdgpu)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory disclosure leading to privilege escalation, system crash, or information leakage of sensitive kernel data.
Likely Case
System instability, kernel panic, or denial of service through memory corruption.
If Mitigated
Limited impact if system has proper access controls and no local attackers, though information disclosure risk remains.
🎯 Exploit Status
Requires local access to trigger the vulnerable code path; exploitation may require specific GPU operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions containing commits 32915dc909ff502823babfe07d5416c5b6e8a8b1, 45f7b02afc464c208e8f56bcbc672ef5c364c815, 725b728cc0c8c5fafdfb51cb0937870d33a40fa4, d768394fa99467bcf2703bde74ddc96eeb0b71fa, or db7a86676fd624768a5d907faf34ad7bb4ff25f4
Vendor Advisory: https://git.kernel.org/stable/c/32915dc909ff502823babfe07d5416c5b6e8a8b1
Restart Required: Yes
Instructions:
1. Update Linux kernel to a patched version from your distribution. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.
🔧 Temporary Workarounds
Disable AMD GPU driver
linuxTemporarily disable the amdgpu kernel module to prevent exploitation
echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict local user access to systems with AMD GPUs
- Implement strict access controls and monitoring for GPU-related operations
🔍 How to Verify
Check if Vulnerable:
Check if amdgpu module is loaded: lsmod | grep amdgpu. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes one of the fix commits. Check dmesg for amdgpu driver loading without errors.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- amdgpu driver error messages in dmesg
- Out of bounds memory access warnings
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND ("amdgpu" OR "out of bounds" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/32915dc909ff502823babfe07d5416c5b6e8a8b1
- https://git.kernel.org/stable/c/45f7b02afc464c208e8f56bcbc672ef5c364c815
- https://git.kernel.org/stable/c/725b728cc0c8c5fafdfb51cb0937870d33a40fa4
- https://git.kernel.org/stable/c/d768394fa99467bcf2703bde74ddc96eeb0b71fa
- https://git.kernel.org/stable/c/db7a86676fd624768a5d907faf34ad7bb4ff25f4
- https://git.kernel.org/stable/c/f9267972490f9fcffe146e79828e97acc0da588c
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html