CVE-2024-46806

5.5 MEDIUM

📋 TL;DR

A division-by-zero vulnerability in the AMD GPU driver for Linux kernel could cause kernel panic or system crash when processing invalid partition modes. This affects Linux systems with AMD GPUs using the amdgpu driver. Attackers could potentially trigger denial of service.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU support
Versions: Linux kernel versions with vulnerable amdgpu driver code (specific versions not provided in CVE)
Operating Systems: Linux distributions with AMD GPU support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD GPUs using the amdgpu driver. Requires specific conditions to trigger invalid partition mode.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot

🟠

Likely Case

System crash requiring reboot, potentially causing service disruption and data loss in unsaved work

🟢

If Mitigated

Minor service interruption if systems have automatic recovery mechanisms

🌐 Internet-Facing: LOW - Requires local access or ability to interact with GPU driver
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or through compromised applications

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to interact with GPU driver, likely through local access or compromised application. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit 1a00f2ac82d6bc6689388c7edcd2a4bd82664f3c or later

Vendor Advisory: https://git.kernel.org/stable/c/1a00f2ac82d6bc6689388c7edcd2a4bd82664f3c

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable AMD GPU driver

linux

Remove or blacklist amdgpu kernel module to prevent vulnerability trigger

echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD GPUs
  • Monitor system logs for kernel panic or crash events related to GPU operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if amdgpu module is loaded: lsmod | grep amdgpu

Check Version:

uname -r

Verify Fix Applied:

Check kernel version contains fix commit: uname -r and verify with distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • GPU driver error logs
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "amdgpu")

🔗 References

📤 Share & Export