VYPR
High severity7.8NVD Advisory· Published Sep 27, 2024· Updated May 5, 2026

CVE-2024-46812

CVE-2024-46812

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration

[Why] Coverity reports Memory - illegal accesses.

[How] Skip inactive planes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, AMDGPU display driver mishandles inactive planes leading to memory access violations, potentially causing system instability or privilege escalation.

Vulnerability

Details

The Linux kernel's AMDGPU display driver, in the ModeSupportAndSystemConfiguration function, fails to skip inactive planes, resulting in illegal memory accesses. This issue was reported by Coverity as a memory access violation [1][2][3][4].

Exploitation

A local attacker with the ability to issue DRM ioctls could trigger this code path by manipulating display configuration, potentially causing the kernel to access memory beyond allocated buffers. No special privileges beyond local access are required.

Impact

Successful exploitation can lead to a kernel crash (denial of service). In the worst case, memory corruption may allow an attacker to escalate privileges, though this has not been confirmed.

Mitigation

The fix is included in the Linux kernel stable branches as commits such as those referenced [1][2][3][4]. Users should update their kernels to the latest stable version to remediate this vulnerability.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

97

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.