CVE-2026-31488
Use-After-Free in Linux amdgpu DRM Due to DSC Mode Change Handling
Publication date: 2026-04-22
Last updated on: 2026-04-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.18 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.21 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.11 (exc) |
| linux | linux_kernel | From 5.18.1 (inc) to 6.12.80 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's AMD GPU display driver (amdgpu). It involves incorrect handling of mode changes during Display Stream Compression (DSC) validation. Specifically, when multiple changes occur in the same Kernel Mode Setting (KMS) commitβsome related to DSC and others unrelatedβthe driver incorrectly resets a flag (mode_changed) that tracks whether a display mode has changed. This causes the driver to skip processing some mode changes, leading to a memory leak and a use-after-free error when the display stream is later disabled.
The issue arises because the driver drops the mode_changed flag incorrectly for integrated panels when external DisplayPort Multi-Stream Transport (DP-MST) screens are plugged in, even if the DSC configuration did not change. This results in old display streams not being released and new streams not being properly referenced, causing kernel memory errors.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks and use-after-free errors in the Linux kernel's AMD GPU driver. Such memory corruption issues can cause system instability, crashes, or unexpected behavior when managing display outputs, especially when connecting or disconnecting external monitors.
In practical terms, users of affected systems might experience graphical glitches, system crashes, or kernel panics when changing display configurations involving DSC and DP-MST. Additionally, memory corruption vulnerabilities can potentially be exploited to escalate privileges or execute arbitrary code, although no specific exploit details are provided.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by a patch that correctly handles the mode_changed flag during DSC validation in the amdgpu driver.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix (commit cc7c7121ae082b7b82891baa7280f1ff2608f22b or later).
This update prevents memory leaks and use-after-free errors related to DSC configuration changes in amdgpu.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a use-after-free bug in the amdgpu driver, which can cause kernel errors related to memory management in the DRM AMD display subsystem.
Detection would typically involve monitoring kernel logs for specific error messages indicating the issue, such as KASAN (Kernel Address Sanitizer) reports of use-after-free in dc_stream_release within the amdgpu module.
- Check kernel logs for error messages using: dmesg | grep -i amdgpu
- Look specifically for KASAN use-after-free reports: dmesg | grep -i kasan
- Monitor for BUG messages related to dc_stream_release or drm_mode_rmfb_work_fn in kernel logs.
Since this is a kernel-level issue related to the amdgpu driver, no specific network commands are applicable for detection.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details about the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.