CVE-2024-46750

5.5 MEDIUM

📋 TL;DR

A missing lock in the Linux kernel's PCI subsystem allows concurrent access during bus resets, potentially causing system instability or crashes. This affects Linux systems with PCI devices, particularly those using the VMD driver or performing bus resets. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but fix commits indicate recent kernel versions before patches were applied
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with PCI devices, especially those using VMD driver or performing PCI bus resets are most affected. The vulnerability is triggered during PCI bus reset operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash or kernel panic leading to denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System instability, kernel warnings, or temporary service interruption during PCI bus operations.

🟢

If Mitigated

Minor performance impact during PCI operations with proper locking in place.

🌐 Internet-Facing: LOW - Requires local access to trigger, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes could trigger instability, affecting system reliability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger PCI bus resets. This is primarily a stability issue rather than a security bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits: 04e85a3285b0e5c5af6fd2c0fd6e95ffecc01945, 0790b89c7e911003b8c50ae50e3ac7645de1fae9, 7253b4fed46471cc247c6cacefac890a8472c083, 78c6e39fef5c428960aff742149bba302dd46f5a, 81c68e218ab883dfa368460a59b674084c0240da

Vendor Advisory: https://git.kernel.org/stable/c/04e85a3285b0e5c5af6fd2c0fd6e95ffecc01945

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Check kernel version matches patched commits. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict PCI bus reset operations

linux

Limit access to PCI bus reset functionality to prevent triggering the vulnerability

echo 0 > /sys/bus/pci/devices/*/reset
chmod 000 /sys/bus/pci/devices/*/reset

🧯 If You Can't Patch

  • Restrict local user access to systems with PCI devices
  • Monitor system logs for PCI reset warnings and investigate any occurrences

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions from distribution vendor. Look for kernel warnings about 'pci_bridge_secondary_bus_reset' in dmesg.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits. Check that PCI bus resets complete without warnings in system logs.

📡 Detection & Monitoring

Log Indicators:

  • WARNING: CPU: ... at drivers/pci/pci.c:4886 pci_bridge_secondary_bus_reset
  • Kernel warnings about PCI bus resets
  • System instability during PCI operations

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "pci_bridge_secondary_bus_reset" AND "WARNING"

🔗 References

📤 Share & Export