Skip to main content

CVE-2024-26916: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26916cvecve-2024-26916
Published: Wed Apr 17 2024 (04/17/2024, 15:59:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: flush any delayed gfxoff on suspend entry" commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring callbacks") caused GFXOFF control to be used more heavily and the codepath that was removed from commit 0dee72639533 ("drm/amd: flush any delayed gfxoff on suspend entry") now can be exercised at suspend again. Users report that by using GNOME to suspend the lockscreen trigger will cause SDMA traffic and the system can deadlock. This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.

AI-Powered Analysis

AILast updated: 06/29/2025, 13:10:01 UTC

Technical Analysis

CVE-2024-26916 is a vulnerability identified in the Linux kernel related to the AMD GPU driver subsystem, specifically the Direct Rendering Manager (DRM) component for AMD graphics (amdgpu). The issue stems from a regression caused by a commit (ab4750332dbe) that reintroduced a code path previously removed to handle the flushing of delayed GFXOFF (graphics off) operations during system suspend. The original commit (0dee72639533) was designed to flush any delayed GFXOFF on suspend entry to prevent deadlocks. However, the newer commit increased the use of GFXOFF control, which inadvertently re-enabled the problematic code path. This leads to a scenario where, when a user suspends the system using GNOME's lockscreen trigger, the system initiates SDMA (System Direct Memory Access) traffic that can cause the system to deadlock. The deadlock occurs because the driver attempts to manage graphics power states during suspend but fails to properly flush or handle delayed operations, resulting in a system hang. This vulnerability affects multiple recent Linux kernel versions containing the specified commits. Although no known exploits are reported in the wild, the issue can cause denial of service by making the system unresponsive during suspend operations involving AMD GPUs. The vulnerability is particularly relevant for systems using the amdgpu driver and running desktop environments like GNOME that utilize the lockscreen suspend feature.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems equipped with AMD GPUs. Systems may become unresponsive or deadlock during suspend operations, potentially leading to data loss if unsaved work is interrupted or if systems are used in critical environments where uptime is essential. Organizations relying on Linux workstations or servers with AMD graphics, especially those using GNOME or similar desktop environments that trigger suspend via lockscreen, may experience operational disruptions. This can affect sectors such as research institutions, media production companies, and enterprises using Linux desktops. While the vulnerability does not appear to allow privilege escalation or remote code execution, the deadlock can impact availability and productivity. In environments with automated suspend policies or remote management, this could complicate system maintenance and increase support overhead. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid potential exploitation or accidental system outages.

Mitigation Recommendations

To mitigate CVE-2024-26916, organizations should apply the latest Linux kernel patches that revert the problematic commit and restore the flushing of delayed GFXOFF operations on suspend entry. Kernel updates from trusted Linux distributions that include this fix should be prioritized. For environments where immediate patching is not feasible, temporary workarounds include disabling suspend via the GNOME lockscreen or avoiding suspend operations on affected systems until patched. Administrators can also monitor system logs for signs of deadlock or suspend failures related to amdgpu. Testing kernel updates in a controlled environment before wide deployment is recommended to ensure stability. Additionally, organizations should maintain robust backup and recovery procedures to mitigate potential data loss from unexpected system hangs. Coordination with hardware vendors and Linux distribution maintainers can provide further guidance and support. Finally, educating users about the symptoms and advising them to avoid triggering suspend via lockscreen until patched can reduce incident occurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.193Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2e09

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:10:01 PM

Last updated: 8/16/2025, 9:45:00 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats