Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate user queue size constraints

Add validation to ensure user queue sizes meet hardware requirements:
- Size must be a power of two for efficient ring buffer wrapping
- Size must be at least AMDGPU_GPU_PAGE_SIZE to prevent undersized allocations

This prevents invalid configurations that could lead to GPU faults or
unexpected behavior.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel previously lacked validation for AMDGPU user queue sizes. Without checks, a queue size not being a power of two or smaller than AMDGPU_GPU_PAGE_SIZE could cause GPU faults or unpredictable behavior, potentially crashing GPU-dependent processes.

Affected Systems

The vulnerability affects Linux kernel builds that include the AMDGPU driver module. Exact kernel versions are unspecified, but any kernel lacking the recent validation change is vulnerable.

Risk and Exploitability

No CVSS or EPSS score is available, and the vulnerability is not listed in CISA KEV. The flaw is a kernel-level defect that could be exploited by an attacker with local or privileged access to trigger GPU faults, resulting in a denial of service for applications using the GPU. The lack of a publicly documented attack vector means the risk is primarily tied to local exploitation scenarios.

Generated by OpenCVE AI on May 6, 2026 at 14:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the AMDGPU queue size validation fix.
  • Ensure the kernel upgrade is accompanied by the corresponding updated AMDGPU driver modules.
  • Verify that no legacy kernel modules referencing unsupported queue sizes remain loaded.

Generated by OpenCVE AI on May 6, 2026 at 14:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate user queue size constraints Add validation to ensure user queue sizes meet hardware requirements: - Size must be a power of two for efficient ring buffer wrapping - Size must be at least AMDGPU_GPU_PAGE_SIZE to prevent undersized allocations This prevents invalid configurations that could lead to GPU faults or unexpected behavior.
Title drm/amdgpu: validate user queue size constraints
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:03.437Z

Reserved: 2026-05-01T14:12:55.992Z

Link: CVE-2026-43195

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:38.487

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses