CVE-2024-50004: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 [WHY & HOW] Mismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause grey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override to match HW spec. (cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)
AI Analysis
Technical Summary
CVE-2024-50004 is a vulnerability identified in the Linux kernel specifically affecting the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The issue lies within the Display Microarchitecture Layer 2 (DML2) policy implementation for the DCN35 display engine. The vulnerability arises due to a mismatch in the DML2 policy that causes bandwidth validation failures. This failure leads to the unexpected acquisition of a Display Pipe Processor (DPP) pipe resource, which in turn results in a grey screen and system hang conditions. The root cause is an override of the EnhancedPrefetchScheduleAccelerationFinal parameter that does not align with the hardware specifications, causing the bandwidth validation logic to malfunction. The fix involves removing this override to ensure the policy matches the hardware spec, thereby preventing the system from entering an unstable state. This vulnerability affects specific Linux kernel versions identified by the commit hash 7966f319c66d9468623c6a6a017ecbc0dd79be75. Although no known exploits are currently reported in the wild, the issue can cause denial of service through system hangs and display failures on affected AMD GPU configurations running Linux kernels with the vulnerable code.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with AMD graphics hardware that utilize the affected DRM driver code. The impact manifests as system instability, including grey screens and system hangs, which can disrupt business operations, especially in environments relying on Linux-based workstations or servers with graphical interfaces. Industries such as media production, scientific research, and any sector using Linux desktops or graphical applications with AMD GPUs may experience productivity losses. Additionally, critical infrastructure or industrial control systems using Linux with AMD graphics could face operational disruptions. While this vulnerability does not directly lead to data breaches or privilege escalation, the denial of service effect can cause significant downtime and operational impact. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the issue.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions that include the patch removing the EnhancedPrefetchScheduleAccelerationFinal override in the DRM AMD display driver. Kernel updates should be sourced from trusted Linux distribution maintainers or directly from the Linux kernel mainline if applicable. Organizations should audit their systems to identify those running AMD GPUs with the affected kernel versions and prioritize patching these systems. For environments where immediate patching is not feasible, consider disabling or limiting graphical workloads that rely on the affected DRM driver to reduce exposure. Monitoring system logs for signs of display-related errors or system hangs can help detect attempts to trigger the vulnerability. Additionally, organizations should maintain robust backup and recovery procedures to mitigate the impact of potential system hangs or crashes. Coordination with hardware vendors for firmware updates or driver patches may also be beneficial if further mitigations become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-50004: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 [WHY & HOW] Mismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause grey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override to match HW spec. (cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)
AI-Powered Analysis
Technical Analysis
CVE-2024-50004 is a vulnerability identified in the Linux kernel specifically affecting the Direct Rendering Manager (DRM) subsystem for AMD graphics hardware. The issue lies within the Display Microarchitecture Layer 2 (DML2) policy implementation for the DCN35 display engine. The vulnerability arises due to a mismatch in the DML2 policy that causes bandwidth validation failures. This failure leads to the unexpected acquisition of a Display Pipe Processor (DPP) pipe resource, which in turn results in a grey screen and system hang conditions. The root cause is an override of the EnhancedPrefetchScheduleAccelerationFinal parameter that does not align with the hardware specifications, causing the bandwidth validation logic to malfunction. The fix involves removing this override to ensure the policy matches the hardware spec, thereby preventing the system from entering an unstable state. This vulnerability affects specific Linux kernel versions identified by the commit hash 7966f319c66d9468623c6a6a017ecbc0dd79be75. Although no known exploits are currently reported in the wild, the issue can cause denial of service through system hangs and display failures on affected AMD GPU configurations running Linux kernels with the vulnerable code.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with AMD graphics hardware that utilize the affected DRM driver code. The impact manifests as system instability, including grey screens and system hangs, which can disrupt business operations, especially in environments relying on Linux-based workstations or servers with graphical interfaces. Industries such as media production, scientific research, and any sector using Linux desktops or graphical applications with AMD GPUs may experience productivity losses. Additionally, critical infrastructure or industrial control systems using Linux with AMD graphics could face operational disruptions. While this vulnerability does not directly lead to data breaches or privilege escalation, the denial of service effect can cause significant downtime and operational impact. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the issue.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions that include the patch removing the EnhancedPrefetchScheduleAccelerationFinal override in the DRM AMD display driver. Kernel updates should be sourced from trusted Linux distribution maintainers or directly from the Linux kernel mainline if applicable. Organizations should audit their systems to identify those running AMD GPUs with the affected kernel versions and prioritize patching these systems. For environments where immediate patching is not feasible, consider disabling or limiting graphical workloads that rely on the affected DRM driver to reduce exposure. Monitoring system logs for signs of display-related errors or system hangs can help detect attempts to trigger the vulnerability. Additionally, organizations should maintain robust backup and recovery procedures to mitigate the impact of potential system hangs or crashes. Coordination with hardware vendors for firmware updates or driver patches may also be beneficial if further mitigations become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.059Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfc65
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 4:10:44 PM
Last updated: 8/7/2025, 1:35:50 PM
Views: 11
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.