Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Limit BO list entry count to prevent resource exhaustion

Userspace can pass an arbitrary number of BO list entries via the
bo_number field. Although the previous multiplication overflow check
prevents out-of-bounds allocation, a large number of entries could still
cause excessive memory allocation (up to potentially gigabytes) and
unnecessarily long list processing times.

Introduce a hard limit of 128k entries per BO list, which is more than
sufficient for any realistic use case (e.g., a single list containing all
buffers in a large scene). This prevents memory exhaustion attacks and
ensures predictable performance.

Return -EINVAL if the requested entry count exceeds the limit

(cherry picked from commit 688b87d39e0aa8135105b40dc167d74b5ada5332)
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via memory exhaustion
Action: Apply patch
AI Analysis

Impact

In the Linux kernel’s AMDGPU driver, userspace can provide an arbitrarily large number of buffer object (BO) list entries through the bo_number field. The previous overflow check stops out‑of‑bounds allocation but does not limit how many entries can be requested. A large request can therefore cause the driver to allocate a massive amount of memory—potentially many gigabytes—and to perform very long list traversals, leading to severe memory exhaustion and slowed system performance. The fix introduces a hard limit of 128 000 entries per BO list, and returns an error if the requested count exceeds this limit, preventing the excessive allocation from occurring.

Affected Systems

This issue affects the AMDGPU component of the Linux kernel. The vulnerability is present in all kernel versions that compile the affected driver before the commit that enforces the 128 000 entry limit. No specific version ranges are listed, so any kernel build without the patch is potentially vulnerable.

Risk and Exploitability

The attack requires a process that can communicate with the AMDGPU driver, typically a privileged or user‑space application with DRM access. Because the vulnerability relies on kernel‑mode allocation, exploitation is likely limited to local or privileged users, reducing the likelihood of widespread remote attacks. The lack of an EPSS score and absence from the CISA KEV catalog suggest moderate exploitation risk, but the potential for DoS by exhausting system memory remains a serious concern for affected systems.

Generated by OpenCVE AI on April 3, 2026 at 19:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that contains the patch limiting BO list entry counts
  • Verify that the kernel source includes commit 688b87d39e0aa8135105b40dc167d74b5ada5332 or its equivalent
  • Reboot the system after the kernel upgrade to activate the updated driver
  • If an immediate kernel upgrade is not possible, restrict untrusted processes from accessing the GPU driver and monitor system memory usage for abnormal growth

Generated by OpenCVE AI on April 3, 2026 at 19:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6253-1 linux security update
History

Thu, 07 May 2026 05:30:00 +0000


Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Limit BO list entry count to prevent resource exhaustion Userspace can pass an arbitrary number of BO list entries via the bo_number field. Although the previous multiplication overflow check prevents out-of-bounds allocation, a large number of entries could still cause excessive memory allocation (up to potentially gigabytes) and unnecessarily long list processing times. Introduce a hard limit of 128k entries per BO list, which is more than sufficient for any realistic use case (e.g., a single list containing all buffers in a large scene). This prevents memory exhaustion attacks and ensures predictable performance. Return -EINVAL if the requested entry count exceeds the limit (cherry picked from commit 688b87d39e0aa8135105b40dc167d74b5ada5332)
Title drm/amdgpu: Limit BO list entry count to prevent resource exhaustion
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-07T04:35:04.390Z

Reserved: 2026-01-13T15:37:46.021Z

Link: CVE-2026-23468

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:34.330

Modified: 2026-05-07T06:16:03.330

Link: CVE-2026-23468

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23468 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:45Z

Weaknesses