PT-2024-32223 · Linux+1 · Linux Kernel+1

Published

2024-05-13

·

Updated

2026-03-16

·

CVE-2024-46820

CVSS v3.1

7.8

High

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Linux kernel version 5.0.0
Description The issue is related to the removal of irq disabling in vcn 5 suspend in the Linux kernel. Specifically, the calls to disable IRQ and set state are removed, which gets rid of the warning "WARN ON(!amdgpu irq enabled(adev, src, type))" in amdgpu irq put(). This change is made because VCN IRQ is not directly enabled or disabled in vcn 5.0.0, and the IRQ state is not handled.
Recommendations As a temporary workaround, consider disabling the amdgpu irq put() function until a patch is available. Restrict access to the drm/amdgpu/vcn module to minimize the risk of exploitation. Avoid using the amdgpu irq enabled() function in the affected API endpoint until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Weakness Enumeration

Related Identifiers

ALSA-2025_12746
ALSA-2025_12752
ALSA-2025_12753
ALSA-2025_16880
BDU:2025-07237
CVE-2024-46820
INFSA-2025_6966
RHSA-2025:6966
RHSA-2025_6966

Affected Products

Linux Kernel
Red Hat