CVE-2026-31488
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-416
Utilización después de liberación
Fecha de publicación:
22/04/2026
Última modificación:
17/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amd/display: Do not skip unrelated mode changes in DSC validation<br />
<br />
Starting with commit 17ce8a6907f7 ("drm/amd/display: Add dsc pre-validation in<br />
atomic check"), amdgpu resets the CRTC state mode_changed flag to false when<br />
recomputing the DSC configuration results in no timing change for a particular<br />
stream.<br />
<br />
However, this is incorrect in scenarios where a change in MST/DSC configuration<br />
happens in the same KMS commit as another (unrelated) mode change. For example,<br />
the integrated panel of a laptop may be configured differently (e.g., HDR<br />
enabled/disabled) depending on whether external screens are attached. In this<br />
case, plugging in external DP-MST screens may result in the mode_changed flag<br />
being dropped incorrectly for the integrated panel if its DSC configuration<br />
did not change during precomputation in pre_validate_dsc().<br />
<br />
At this point, however, dm_update_crtc_state() has already created new streams<br />
for CRTCs with DSC-independent mode changes. In turn,<br />
amdgpu_dm_commit_streams() will never release the old stream, resulting in a<br />
memory leak. amdgpu_dm_atomic_commit_tail() will never acquire a reference to<br />
the new stream either, which manifests as a use-after-free when the stream gets<br />
disabled later on:<br />
<br />
BUG: KASAN: use-after-free in dc_stream_release+0x25/0x90 [amdgpu]<br />
Write of size 4 at addr ffff88813d836524 by task kworker/9:9/29977<br />
<br />
Workqueue: events drm_mode_rmfb_work_fn<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x6e/0xa0<br />
print_address_description.constprop.0+0x88/0x320<br />
? dc_stream_release+0x25/0x90 [amdgpu]<br />
print_report+0xfc/0x1ff<br />
? srso_alias_return_thunk+0x5/0xfbef5<br />
? __virt_addr_valid+0x225/0x4e0<br />
? dc_stream_release+0x25/0x90 [amdgpu]<br />
kasan_report+0xe1/0x180<br />
? dc_stream_release+0x25/0x90 [amdgpu]<br />
kasan_check_range+0x125/0x200<br />
dc_stream_release+0x25/0x90 [amdgpu]<br />
dc_state_destruct+0x14d/0x5c0 [amdgpu]<br />
dc_state_release.part.0+0x4e/0x130 [amdgpu]<br />
dm_atomic_destroy_state+0x3f/0x70 [amdgpu]<br />
drm_atomic_state_default_clear+0x8ee/0xf30<br />
? drm_mode_object_put.part.0+0xb1/0x130<br />
__drm_atomic_state_free+0x15c/0x2d0<br />
atomic_remove_fb+0x67e/0x980<br />
<br />
Since there is no reliable way of figuring out whether a CRTC has unrelated<br />
mode changes pending at the time of DSC validation, remember the value of the<br />
mode_changed flag from before the point where a CRTC was marked as potentially<br />
affected by a change in DSC configuration. Reset the mode_changed flag to this<br />
earlier value instead in pre_validate_dsc().<br />
<br />
(cherry picked from commit cc7c7121ae082b7b82891baa7280f1ff2608f22b)
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18.1 (incluyendo) | 6.12.80 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.21 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/10862e344b4d6434642a48c87d765813fc0b0ba7
- https://git.kernel.org/stable/c/111208b5b7ebcdadb3f922cc52d8425f0fa91b33
- https://git.kernel.org/stable/c/21159d8b335a6b9f44cbb506733013a902ae2da4
- https://git.kernel.org/stable/c/8a5edc97fd9c6415ff2eff872748439a97e3c3d8
- https://git.kernel.org/stable/c/aed3d041ab061ec8a64f50a3edda0f4db7280025



