CVE-2026-31461
Received Received - Intake
Memory Leak in Linux Kernel amdgpu_dm DRM EDID Handling

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix drm_edid leak in amdgpu_dm [WHAT] When a sink is connected, aconnector->drm_edid was overwritten without freeing the previous allocation, causing a memory leak on resume. [HOW] Free the previous drm_edid before updating it. (cherry picked from commit 52024a94e7111366141cfc5d888b2ef011f879e5)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's AMD GPU display driver (amdgpu_dm). When a display sink is connected, the drm_edid pointer in the connector structure was overwritten without freeing the previously allocated memory. This caused a memory leak during the resume process.

The issue was fixed by ensuring that the previous drm_edid allocation is freed before updating it with a new value.


How can this vulnerability impact me? :

This vulnerability can lead to a memory leak in the Linux kernel when using AMD GPU display drivers. Over time, this memory leak could cause increased memory usage, potentially leading to system instability or degraded performance, especially on systems that frequently suspend and resume.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed by ensuring that the previous drm_edid allocation is freed before updating it in the amdgpu_dm driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for this issue.

  • Apply the kernel patch that fixes the drm_edid leak in the amdgpu_dm driver.
  • Upgrade your Linux kernel to the latest stable release that contains this fix.
  • Reboot the system after applying the update to ensure the fix is active.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart