CVE-2024-26913: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue [why] odm calculation is missing for pipe split policy determination and cause Underflow/Corruption issue. [how] Add the odm calculation.
AI Analysis
Technical Summary
CVE-2024-26913 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The issue pertains to the dcn35 8k30 display pipeline, where a missing odm (Output Data Multiplier) calculation in the pipe split policy determination logic causes an underflow or corruption condition. The underflow likely occurs when the display pipeline does not receive data at the expected rate, leading to visual corruption or potential instability in the graphics subsystem. The root cause is the omission of the odm calculation, which is critical for correctly managing the data flow in multi-pipe display configurations. The fix involves adding the missing odm calculation to ensure proper pipe split policy determination, thereby preventing underflow and corruption. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and no known exploits are currently reported in the wild. Since this vulnerability is in the kernel's graphics driver layer, it could impact systems using AMD GPUs with the affected display engine, particularly those running Linux kernels prior to the patch. No CVSS score has been assigned yet, and the vulnerability was published on April 17, 2024.
Potential Impact
For European organizations, the impact of CVE-2024-26913 depends largely on their use of Linux systems with AMD graphics hardware, especially in environments where high-resolution or multi-display setups are common (e.g., media production, scientific visualization, or digital signage). The underflow and corruption issues could lead to degraded display performance, visual artifacts, or system instability, potentially disrupting critical workflows. While this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could cause denial of service conditions or data corruption in graphical applications. Organizations relying on Linux-based workstations or servers with AMD GPUs may experience reduced reliability or increased maintenance overhead until patched. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug. The vulnerability may also affect embedded or industrial systems using Linux with AMD graphics, which are prevalent in some European manufacturing and research sectors.
Mitigation Recommendations
European organizations should promptly identify Linux systems running AMD GPUs with the affected kernel versions and apply the official kernel patches that include the odm calculation fix. Since the vulnerability is in the kernel DRM driver, updating to the latest stable Linux kernel release that addresses CVE-2024-26913 is the most effective mitigation. For environments where immediate kernel upgrades are challenging, organizations should consider temporarily disabling or limiting the use of affected display features (such as multi-pipe 8k30 configurations) to reduce the risk of triggering the underflow. Monitoring system logs for DRM-related errors or display corruption symptoms can help detect exploitation attempts or instability. Additionally, organizations should maintain robust backup and recovery procedures for critical graphical data and workflows to mitigate potential data loss from corruption. Coordination with AMD and Linux distribution vendors for timely patch deployment and testing is recommended to ensure compatibility and stability post-update.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2024-26913: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue [why] odm calculation is missing for pipe split policy determination and cause Underflow/Corruption issue. [how] Add the odm calculation.
AI-Powered Analysis
Technical Analysis
CVE-2024-26913 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The issue pertains to the dcn35 8k30 display pipeline, where a missing odm (Output Data Multiplier) calculation in the pipe split policy determination logic causes an underflow or corruption condition. The underflow likely occurs when the display pipeline does not receive data at the expected rate, leading to visual corruption or potential instability in the graphics subsystem. The root cause is the omission of the odm calculation, which is critical for correctly managing the data flow in multi-pipe display configurations. The fix involves adding the missing odm calculation to ensure proper pipe split policy determination, thereby preventing underflow and corruption. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and no known exploits are currently reported in the wild. Since this vulnerability is in the kernel's graphics driver layer, it could impact systems using AMD GPUs with the affected display engine, particularly those running Linux kernels prior to the patch. No CVSS score has been assigned yet, and the vulnerability was published on April 17, 2024.
Potential Impact
For European organizations, the impact of CVE-2024-26913 depends largely on their use of Linux systems with AMD graphics hardware, especially in environments where high-resolution or multi-display setups are common (e.g., media production, scientific visualization, or digital signage). The underflow and corruption issues could lead to degraded display performance, visual artifacts, or system instability, potentially disrupting critical workflows. While this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could cause denial of service conditions or data corruption in graphical applications. Organizations relying on Linux-based workstations or servers with AMD GPUs may experience reduced reliability or increased maintenance overhead until patched. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug. The vulnerability may also affect embedded or industrial systems using Linux with AMD graphics, which are prevalent in some European manufacturing and research sectors.
Mitigation Recommendations
European organizations should promptly identify Linux systems running AMD GPUs with the affected kernel versions and apply the official kernel patches that include the odm calculation fix. Since the vulnerability is in the kernel DRM driver, updating to the latest stable Linux kernel release that addresses CVE-2024-26913 is the most effective mitigation. For environments where immediate kernel upgrades are challenging, organizations should consider temporarily disabling or limiting the use of affected display features (such as multi-pipe 8k30 configurations) to reduce the risk of triggering the underflow. Monitoring system logs for DRM-related errors or display corruption symptoms can help detect exploitation attempts or instability. Additionally, organizations should maintain robust backup and recovery procedures for critical graphical data and workflows to mitigate potential data loss from corruption. Coordination with AMD and Linux distribution vendors for timely patch deployment and testing is recommended to ensure compatibility and stability post-update.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.193Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3f26
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:11:21 PM
Last updated: 7/31/2025, 12:16:46 AM
Views: 12
Related Threats
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.