Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36969— drm/amd/display: Fix division by zero in setup_dsc_config

EPSS 0.02% · P6

Affected Version Matrix 14

VendorProductVersion RangeStatus
LinuxLinux4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< a32c8f951c8a456c1c251e1dcdf21787f8066445affected
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< 91402e0e5de9124a3108db7a14163fcf9a6d322faffected
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< 7e4f50dfc98c49b3dc6875a35c3112522fb25639affected
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< f187fcbbb8f8bf10c6687f0beae22509369f7563affected
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< 308de6be0c9c7ba36915c0d398e771725c0ea911affected
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c< 130afc8a886183a94cf6eab7d24f300014ff87baaffected
4.15affected
< 4.15unaffected
… +6 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36969

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
drm/amd/display: Fix division by zero in setup_dsc_config
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix division by zero in setup_dsc_config When slice_height is 0, the division by slice_height in the calculation of the number of slices will cause a division by zero driver crash. This leaves the kernel in a state that requires a reboot. This patch adds a check to avoid the division by zero. The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor connected via Thunderbolt. The amdgpu driver crashed with this exception when I rebooted the system with the monitor connected. kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) kernel: ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminator 2)) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: ? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu kernel: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1109) amdgpu After applying this patch, the driver no longer crashes when the monitor is connected and the system is rebooted. I believe this is the same issue reported for 3113.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于drm/amd/display 中存在安全问题,可能导致驱动程序崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c ~ a32c8f951c8a456c1c251e1dcdf21787f8066445 -
LinuxLinux 4.15 -

II. Public POCs for CVE-2024-36969

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36969

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-06-08 · 6 CVEs total

CVE-2024-36965remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
CVE-2024-36966erofs: reliably distinguish block based and fscache mode
CVE-2024-36967KEYS: trusted: Fix memory leak in tpm2_key_encode()
CVE-2024-36968Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
CVE-2024-36970wifi: iwlwifi: Use request_module_nowait

IV. Related Vulnerabilities

V. Comments for CVE-2024-36969

No comments yet


Leave a comment