Impact
The AMDGPU driver in the Linux kernel incorrectly clears the CRTC mode_changed flag during DSC pre‑validation when a stream’s timing does not change. This logic flaw leads to a memory leak of the old stream and later causes a use‑after‑free when the stream is disabled, as evidenced by a KASAN error in the kernel logs. The flaw can surface when display parameters change, for example when plugging or unplugging external DP‑MST displays or toggling HDR settings on an integrated panel.
Affected Systems
All Linux kernel releases that compile the AMDGPU DRM module and include the pre‑validation logic before the upstream commit that restores the mode_changed flag. This includes standard Linux distributions running AMD GPUs on laptops or desktops, particularly those that use integrated panels and external DP‑MST displays.
Risk and Exploitability
The CVSS score of 7.8 indicates medium‑to‑high severity. The EPSS score is below 1% and the vulnerability is not listed in CISA KEV, suggesting limited observed exploitation. Attacking this flaw requires local control over display mode changes, such as inserting or removing monitors or changing HDR settings, which can trigger the bug and potentially destabilize the kernel. The need for local control over display mode changes is inferred from the description because the attack vector is not explicitly specified in the CVE data.
OpenCVE Enrichment
Debian DSA