CVE-2024-36969

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36969
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36969.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-36969
Downstream
Related
Published
2024-06-08T12:53:01.353Z
Modified
2025-11-28T02:34:33.548397Z
Summary
drm/amd/display: Fix division by zero in setup_dsc_config
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix division by zero in setupdscconfig

When sliceheight is 0, the division by sliceheight in the calculation of the number of slices will cause a division by zero driver crash. This leaves the kernel in a state that requires a reboot. This patch adds a check to avoid the division by zero.

The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor connected via Thunderbolt. The amdgpu driver crashed with this exception when I rebooted the system with the monitor connected.

kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) kernel: ? dotrap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) kernel: ? setupdscconfig (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dcdsc.c:1053) amdgpu kernel: ? doerrortrap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) kernel: ? setupdscconfig (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dcdsc.c:1053) amdgpu kernel: ? excdivideerror (arch/x86/kernel/traps.c:194 (discriminator 2)) kernel: ? setupdscconfig (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dcdsc.c:1053) amdgpu kernel: ? asmexcdivideerror (./arch/x86/include/asm/idtentry.h:548) kernel: ? setupdscconfig (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dcdsc.c:1053) amdgpu kernel: dcdsccomputeconfig (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dcdsc.c:1109) amdgpu

After applying this patch, the driver no longer crashes when the monitor is connected and the system is rebooted. I believe this is the same issue reported for 3113.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36969.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
a32c8f951c8a456c1c251e1dcdf21787f8066445
Fixed
91402e0e5de9124a3108db7a14163fcf9a6d322f
Fixed
7e4f50dfc98c49b3dc6875a35c3112522fb25639
Fixed
f187fcbbb8f8bf10c6687f0beae22509369f7563
Fixed
308de6be0c9c7ba36915c0d398e771725c0ea911
Fixed
130afc8a886183a94cf6eab7d24f300014ff87ba

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
5.15.160
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.92
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.32
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.11
Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.9.2