Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings

Userspace can either deliberately pass in the too small num_fences, or the
required number can legitimately grow between the two calls to the userq
wait ioctl. In both cases we do not want the emit the kernel warning
backtrace since nothing is wrong with the kernel and userspace will simply
get an errno reported back. So lets simply drop the WARN_ONs.

(cherry picked from commit 2c333ea579de6cc20ea7bc50e9595ef72863e65c)
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel Warning Triggering
Action: Apply Patch
AI Analysis

Impact

The vulnerability enables a userspace application to intentionally trigger kernel warning backtraces through the amdgpu user queue wait ioctl by supplying a num_fences value that is too small or allowing the required count to grow between calls. The kernel’s WARN_ON statements would emit a backtrace, after which userspace receives an errno. The fix removes the WARN_ONs so no warning is emitted, only an error code is returned.

Affected Systems

Systems running the Linux kernel with an amdgpu driver that precedes the commit removing the WARN_ONs are potentially affected. The specific kernel releases are not listed, so any kernel before the applied change should be examined.

Risk and Exploitability

The EPSS score is below 1 %, and the vulnerability is not in the CISA KEV catalog. Exploitation requires local userspace access to the amdgpu driver and only leads to kernel warning messages, not arbitrary code execution or denial of service. Updating to a patched kernel removes the risk.

Generated by OpenCVE AI on March 26, 2026 at 15:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the amdgpu user queue warning mitigation commit.
  • Verify the running kernel version with uname -r.
  • Monitor system logs for amdgpu warning messages if an immediate update is not possible.

Generated by OpenCVE AI on March 26, 2026 at 15:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.16:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-397
CWE-668

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-397
CWE-668

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings Userspace can either deliberately pass in the too small num_fences, or the required number can legitimately grow between the two calls to the userq wait ioctl. In both cases we do not want the emit the kernel warning backtrace since nothing is wrong with the kernel and userspace will simply get an errno reported back. So lets simply drop the WARN_ONs. (cherry picked from commit 2c333ea579de6cc20ea7bc50e9595ef72863e65c)
Title drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:20.076Z

Reserved: 2026-01-13T15:37:45.997Z

Link: CVE-2026-23338

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:31.537

Modified: 2026-04-23T21:17:25.680

Link: CVE-2026-23338

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23338 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:35Z