CVE-2024-26913

7.8 HIGH

📋 TL;DR

This CVE describes a vulnerability in the Linux kernel's AMD display driver where missing ODM (Output Data Mux) calculations during pipe split policy determination can cause underflow or corruption issues. This affects systems using AMD graphics hardware with the vulnerable driver, potentially leading to display artifacts or system instability. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel with AMD display driver (drm/amd/display)
Versions: Linux kernel versions containing the vulnerable dcn35 display driver code
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects systems with AMD graphics hardware using dcn35 display engine when driving 8K@30Hz displays

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash, kernel panic, or persistent display corruption requiring hardware reset

🟠

Likely Case

Display artifacts, temporary system instability, or application crashes when using high-resolution displays (8K@30Hz)

🟢

If Mitigated

Minor display glitches or no visible impact if system isn't using affected display configurations

🌐 Internet-Facing: LOW - Requires local access to system; not remotely exploitable
🏢 Internal Only: MEDIUM - Local attackers or malicious users could cause system instability or denial of service

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific display configuration conditions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit cdbe0be8874c63bca85b8c38e5b1eecbdd18df31 or faf51b201bc42adf500945732abb6220c707d6f3

Vendor Advisory: https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify AMD display driver is updated.

🔧 Temporary Workarounds

Avoid 8K@30Hz display configuration

linux

Use lower resolution or different refresh rate to avoid triggering the vulnerable code path

Set display resolution to 4K or lower
Use 60Hz refresh rate if 8K is required

🧯 If You Can't Patch

  • Restrict local access to systems with vulnerable configurations
  • Implement strict user privilege controls to limit who can modify display settings

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if AMD graphics with dcn35 display engine is in use with 8K@30Hz configuration

Check Version:

uname -r && grep -i 'drm/amd/display' /proc/version

Verify Fix Applied:

Verify kernel includes commit cdbe0be8874c63bca85b8c38e5b1eecbdd18df31 and test 8K@30Hz display functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing display underflow errors
  • AMD GPU driver crash messages
  • Xorg/Wayland display server errors

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("underflow" OR "display corruption" OR "amd" AND "gpu")

🔗 References

📤 Share & Export