Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate doorbell_offset in user queue creation

amdgpu_userq_get_doorbell_index() passes the user-provided
doorbell_offset to amdgpu_doorbell_index_on_bar() without bounds
checking. An arbitrarily large doorbell_offset can cause the
calculated doorbell index to fall outside the allocated doorbell BO,
potentially corrupting kernel doorbell space.

Validate that doorbell_offset falls within the doorbell BO before
computing the BAR index, using u64 arithmetic to prevent overflow.

(cherry picked from commit de1ef4ffd70e1d15f0bf584fd22b1f28cbd5e2ec)
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s amdgpu driver has a flaw where an unbounded doorbell_offset supplied by user space is passed to a function without bounds checking. If an attacker provides a doorbell_offset larger than the allocated doorbell buffer object, the calculated index can reference memory outside that buffer. This out‑of‑bounds write corrupts kernel memory, potentially causing a crash or compromising kernel integrity if the overwritten data is leveraged.

Affected Systems

All Linux kernel releases that include the amdgpu driver before the commit adding bound checking for doorbell_offset are affected. The CVE does not list specific version ranges, so any kernel containing the unvalidated handling routine remains vulnerable until the fix is applied.

Risk and Exploitability

The flaw can be triggered by user‑space code that creates an amdgpu user queue with a malicious doorbell_offset. Because the kernel performs the unchecked calculation, the attack works from a local user context with access to the amdgpu driver. EPSS data is not available and the issue is not in CISA KEV, leaving the exact exploitation likelihood uncertain. The primary risk is kernel memory corruption that could destabilize the system; additional privilege escalation is possible only if the attacker can influence the overwritten data.

Generated by OpenCVE AI on May 2, 2026 at 11:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the patch for doorbell_offset validation in the amdgpu driver
  • Ensure the system is rebooted or the amdgpu module is reloaded after the kernel upgrade so that the old, vulnerable code is not present
  • Limit user access to the amdgpu device nodes so that only trusted users can load the driver or create user queues

Generated by OpenCVE AI on May 2, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-787

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-787

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate doorbell_offset in user queue creation amdgpu_userq_get_doorbell_index() passes the user-provided doorbell_offset to amdgpu_doorbell_index_on_bar() without bounds checking. An arbitrarily large doorbell_offset can cause the calculated doorbell index to fall outside the allocated doorbell BO, potentially corrupting kernel doorbell space. Validate that doorbell_offset falls within the doorbell BO before computing the BAR index, using u64 arithmetic to prevent overflow. (cherry picked from commit de1ef4ffd70e1d15f0bf584fd22b1f28cbd5e2ec)
Title drm/amdgpu: validate doorbell_offset in user queue creation
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:56.622Z

Reserved: 2026-03-09T15:48:24.140Z

Link: CVE-2026-31766

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:39.763

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31766

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31766 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:45:41Z

Weaknesses