CVE-2026-31461
Memory Leak in Linux Kernel amdgpu_dm DRM EDID Handling
Publication date: 2026-04-22
Last updated on: 2026-04-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's AMD GPU display driver (amdgpu_dm). When a display sink is connected, the drm_edid pointer in the connector structure was overwritten without freeing the previously allocated memory. This caused a memory leak during the resume process.
The issue was fixed by ensuring that the previous drm_edid allocation is freed before updating it with a new value.
How can this vulnerability impact me? :
This vulnerability can lead to a memory leak in the Linux kernel when using AMD GPU display drivers. Over time, this memory leak could cause increased memory usage, potentially leading to system instability or degraded performance, especially on systems that frequently suspend and resume.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by ensuring that the previous drm_edid allocation is freed before updating it in the amdgpu_dm driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for this issue.
- Apply the kernel patch that fixes the drm_edid leak in the amdgpu_dm driver.
- Upgrade your Linux kernel to the latest stable release that contains this fix.
- Reboot the system after applying the update to ensure the fix is active.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.