PT-2024-32223 · Linux+1 · Linux Kernel+1
Published
2024-05-13
·
Updated
2026-03-16
·
CVE-2024-46820
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel version 5.0.0
Description
The issue is related to the removal of irq disabling in vcn 5 suspend in the Linux kernel. Specifically, the calls to disable IRQ and set state are removed, which gets rid of the warning "WARN ON(!amdgpu irq enabled(adev, src, type))" in amdgpu irq put(). This change is made because VCN IRQ is not directly enabled or disabled in vcn 5.0.0, and the IRQ state is not handled.
Recommendations
As a temporary workaround, consider disabling the
amdgpu irq put() function until a patch is available.
Restrict access to the drm/amdgpu/vcn module to minimize the risk of exploitation.
Avoid using the amdgpu irq enabled() function in the affected API endpoint until the issue is resolved.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linux Kernel
Red Hat