CVE-2024-26916: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: flush any delayed gfxoff on suspend entry" commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring callbacks") caused GFXOFF control to be used more heavily and the codepath that was removed from commit 0dee72639533 ("drm/amd: flush any delayed gfxoff on suspend entry") now can be exercised at suspend again. Users report that by using GNOME to suspend the lockscreen trigger will cause SDMA traffic and the system can deadlock. This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
AI Analysis
Technical Summary
CVE-2024-26916 is a vulnerability identified in the Linux kernel related to the AMD GPU driver subsystem, specifically the Direct Rendering Manager (DRM) component for AMD graphics (amdgpu). The issue stems from a regression caused by a commit (ab4750332dbe) that reintroduced a code path previously removed to handle the flushing of delayed GFXOFF (graphics off) operations during system suspend. The original commit (0dee72639533) was designed to flush any delayed GFXOFF on suspend entry to prevent deadlocks. However, the newer commit increased the use of GFXOFF control, which inadvertently re-enabled the problematic code path. This leads to a scenario where, when a user suspends the system using GNOME's lockscreen trigger, the system initiates SDMA (System Direct Memory Access) traffic that can cause the system to deadlock. The deadlock occurs because the driver attempts to manage graphics power states during suspend but fails to properly flush or handle delayed operations, resulting in a system hang. This vulnerability affects multiple recent Linux kernel versions containing the specified commits. Although no known exploits are reported in the wild, the issue can cause denial of service by making the system unresponsive during suspend operations involving AMD GPUs. The vulnerability is particularly relevant for systems using the amdgpu driver and running desktop environments like GNOME that utilize the lockscreen suspend feature.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems equipped with AMD GPUs. Systems may become unresponsive or deadlock during suspend operations, potentially leading to data loss if unsaved work is interrupted or if systems are used in critical environments where uptime is essential. Organizations relying on Linux workstations or servers with AMD graphics, especially those using GNOME or similar desktop environments that trigger suspend via lockscreen, may experience operational disruptions. This can affect sectors such as research institutions, media production companies, and enterprises using Linux desktops. While the vulnerability does not appear to allow privilege escalation or remote code execution, the deadlock can impact availability and productivity. In environments with automated suspend policies or remote management, this could complicate system maintenance and increase support overhead. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid potential exploitation or accidental system outages.
Mitigation Recommendations
To mitigate CVE-2024-26916, organizations should apply the latest Linux kernel patches that revert the problematic commit and restore the flushing of delayed GFXOFF operations on suspend entry. Kernel updates from trusted Linux distributions that include this fix should be prioritized. For environments where immediate patching is not feasible, temporary workarounds include disabling suspend via the GNOME lockscreen or avoiding suspend operations on affected systems until patched. Administrators can also monitor system logs for signs of deadlock or suspend failures related to amdgpu. Testing kernel updates in a controlled environment before wide deployment is recommended to ensure stability. Additionally, organizations should maintain robust backup and recovery procedures to mitigate potential data loss from unexpected system hangs. Coordination with hardware vendors and Linux distribution maintainers can provide further guidance and support. Finally, educating users about the symptoms and advising them to avoid triggering suspend via lockscreen until patched can reduce incident occurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-26916: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: flush any delayed gfxoff on suspend entry" commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring callbacks") caused GFXOFF control to be used more heavily and the codepath that was removed from commit 0dee72639533 ("drm/amd: flush any delayed gfxoff on suspend entry") now can be exercised at suspend again. Users report that by using GNOME to suspend the lockscreen trigger will cause SDMA traffic and the system can deadlock. This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
AI-Powered Analysis
Technical Analysis
CVE-2024-26916 is a vulnerability identified in the Linux kernel related to the AMD GPU driver subsystem, specifically the Direct Rendering Manager (DRM) component for AMD graphics (amdgpu). The issue stems from a regression caused by a commit (ab4750332dbe) that reintroduced a code path previously removed to handle the flushing of delayed GFXOFF (graphics off) operations during system suspend. The original commit (0dee72639533) was designed to flush any delayed GFXOFF on suspend entry to prevent deadlocks. However, the newer commit increased the use of GFXOFF control, which inadvertently re-enabled the problematic code path. This leads to a scenario where, when a user suspends the system using GNOME's lockscreen trigger, the system initiates SDMA (System Direct Memory Access) traffic that can cause the system to deadlock. The deadlock occurs because the driver attempts to manage graphics power states during suspend but fails to properly flush or handle delayed operations, resulting in a system hang. This vulnerability affects multiple recent Linux kernel versions containing the specified commits. Although no known exploits are reported in the wild, the issue can cause denial of service by making the system unresponsive during suspend operations involving AMD GPUs. The vulnerability is particularly relevant for systems using the amdgpu driver and running desktop environments like GNOME that utilize the lockscreen suspend feature.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems equipped with AMD GPUs. Systems may become unresponsive or deadlock during suspend operations, potentially leading to data loss if unsaved work is interrupted or if systems are used in critical environments where uptime is essential. Organizations relying on Linux workstations or servers with AMD graphics, especially those using GNOME or similar desktop environments that trigger suspend via lockscreen, may experience operational disruptions. This can affect sectors such as research institutions, media production companies, and enterprises using Linux desktops. While the vulnerability does not appear to allow privilege escalation or remote code execution, the deadlock can impact availability and productivity. In environments with automated suspend policies or remote management, this could complicate system maintenance and increase support overhead. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid potential exploitation or accidental system outages.
Mitigation Recommendations
To mitigate CVE-2024-26916, organizations should apply the latest Linux kernel patches that revert the problematic commit and restore the flushing of delayed GFXOFF operations on suspend entry. Kernel updates from trusted Linux distributions that include this fix should be prioritized. For environments where immediate patching is not feasible, temporary workarounds include disabling suspend via the GNOME lockscreen or avoiding suspend operations on affected systems until patched. Administrators can also monitor system logs for signs of deadlock or suspend failures related to amdgpu. Testing kernel updates in a controlled environment before wide deployment is recommended to ensure stability. Additionally, organizations should maintain robust backup and recovery procedures to mitigate potential data loss from unexpected system hangs. Coordination with hardware vendors and Linux distribution maintainers can provide further guidance and support. Finally, educating users about the symptoms and advising them to avoid triggering suspend via lockscreen until patched can reduce incident occurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.193Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2e09
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:10:01 PM
Last updated: 8/16/2025, 9:45:00 AM
Views: 21
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.