Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix use-after-free race in VM acquire

Replace non-atomic vm->process_info assignment with cmpxchg()
to prevent race when parent/child processes sharing a drm_file
both try to acquire the same VM after fork().

(cherry picked from commit c7c573275ec20db05be769288a3e3bb2250ec618)
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel AMDGPU driver, a race exists when two processes share a drm_file and concurrently acquire the same virtual memory object after a fork, causing the vm->process_info field to be freed and then accessed. This use‑after‑free can lead to kernel memory corruption and potentially a denial of service or other security impact, though the CVE description does not document a specific exploit outcome.

Affected Systems

The flaw affects the DRM subsystem of the Linux kernel, specifically the AMDGPU driver, in any kernel version lacking the commit c7c573275ec20db05be769288a3e3bb2250ec618 or later. Any system running such kernels remains vulnerable.

Risk and Exploitability

No CVSS or EPSS metrics are provided and the vulnerability is not listed in CISA KEV. The attack vector appears to be local: an attacker must be able to spawn relevant processes that share a DRM file to trigger the race during VM acquisition. Because no exploitation evidence is reported, the risk is uncertain, but potential kernel corruption could cause system instability or other security impacts.

Generated by OpenCVE AI on May 8, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel that includes commit c7c573275ec20db05be769288a3e3bb2250ec618 or newer.
  • Reboot the system so the updated kernel and AMDGPU driver are loaded.
  • If an update is not immediately available, consider disabling the AMDGPU driver or switching to an alternative graphics driver until the patch is applied.

Generated by OpenCVE AI on May 8, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix use-after-free race in VM acquire Replace non-atomic vm->process_info assignment with cmpxchg() to prevent race when parent/child processes sharing a drm_file both try to acquire the same VM after fork(). (cherry picked from commit c7c573275ec20db05be769288a3e3bb2250ec618)
Title drm/amdgpu: Fix use-after-free race in VM acquire
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:42.009Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43370

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.067

Modified: 2026-05-08T15:16:48.067

Link: CVE-2026-43370

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43370 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T20:00:12Z

Weaknesses