Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set()

The kfd_event_page_set() function writes KFD_SIGNAL_EVENT_LIMIT * 8
bytes via memset without checking the buffer size parameter. This allows
unprivileged userspace to trigger an out-of bounds kernel memory write
by passing a small buffer, leading to potential privilege
escalation.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability resides in the Linux kernel's DRM AMDKFD driver. The kfd_event_page_set() function performs a memset operation of KFD_SIGNAL_EVENT_LIMIT * 8 bytes onto a buffer that is not verified against the supplied size argument. If an attacker supplies a buffer smaller than the requested length, the memset writes beyond the buffer boundaries, corrupting adjacent kernel memory. This bug can be abused by an unprivileged user to alter kernel data structures and elevate privileges to root.

Affected Systems

All Linux kernel releases that contain the DRM AMDKFD module are affected prior to the patch. The module is part of the Direct Rendering Manager for AMD GPUs. Customers running custom or distribution kernels with the outdated AMDKFD code must verify whether their kernel version incorporates the fix. The vulnerability compromises the entire kernel memory space rather than only a single device.

Risk and Exploitability

The attack requires local access to the kernel via the DRM interface and knowledge of the buffer size expected by kfd_event_page_set(). No EPSS score is available and the vulnerability is not listed in CISA's KEV catalog. The CVSS score is not indicated, but the impact is a classic privilege escalation that may grant unrestricted system control. While no publicly known exploit exists, out‑of‑bounds writes in kernel code frequently lead to efficient kernel exploits. Administrators should treat this as high risk and apply the available patch promptly.

Generated by OpenCVE AI on May 6, 2026 at 14:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the AMDKFD kfd_event_page_set fix.
  • Restrict or block unprivileged users' access to the /dev/dri/kfd device to prevent misuse of the affected function.
  • Enable kernel hardening options such as KASLR, CFG, and Secure Computing mode to reduce the effectiveness of the out‑of‑bounds write.

Generated by OpenCVE AI on May 6, 2026 at 14:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() The kfd_event_page_set() function writes KFD_SIGNAL_EVENT_LIMIT * 8 bytes via memset without checking the buffer size parameter. This allows unprivileged userspace to trigger an out-of bounds kernel memory write by passing a small buffer, leading to potential privilege escalation.
Title drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:10.937Z

Reserved: 2026-05-01T14:12:55.993Z

Link: CVE-2026-43206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:39.903

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T19:00:05Z

Weaknesses