Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl

Drop reference to syncobj and timeline fence when aborting the ioctl due
output array being too small.

(cherry picked from commit 68951e9c3e6bb22396bc42ef2359751c8315dd27)
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a reference leak in the Linux kernel’s AMDGPU driver. A failure to drop references to a syncobj and a timeline fence when an amdgpu_userq_wait_ioctl request aborts because the supplied output array is too small means these objects are never freed. The leak causes kernel memory to be consumed over time, potentially exhausting resources and allowing a local user to disrupt system stability with a denial‑of‑service.

Affected Systems

Vendors listed under the CNA entry are Linux for the Linux kernel. The issue is present in any kernel build that contains the unpatched amdgpu driver, prior to incorporating commit 68951e9c3e6bb22396bc42ef2359751c8315dd27. Specific version information is not supplied by the CNA, so users should verify that their kernel version reflects that commit or newer.

Risk and Exploitability

Because the flaw is triggered by a user‑space ioctl, the attack is local. The CVSS score is not presented; exploitation probability is unknown because EPSS is not available and the vulnerability is not listed in KEV. If an attacker can repeatedly invoke the ioctl with an improperly sized output buffer, they can induce a growing leak of kernel objects, increasing system load and eventually leading to denial of service. The impact is limited to systems running affected kernels and is not apparent from a network perspective. Based on the description, the likely attack vector is a local user executing the amdgpu_userq_wait_ioctl ioctl with an incorrectly sized buffer.

Generated by OpenCVE AI on May 9, 2026 at 04:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains commit 68951e9c3e6bb22396bc42ef2359751c8315dd27 or later, which addresses the memory‑leak identified as CWE-911.
  • If an immediate kernel upgrade is not possible, apply the kernel patch that implements the reference‑count drop in amdgpu_userq_wait_ioctl, fixing the CWE‑911 issue.
  • Ensure that any user‑space application issuing the amdgpu_userq_wait_ioctl ioctl supplies an output array of the correct size to avoid the abort condition and the associated memory‑leak CWE-911.

Generated by OpenCVE AI on May 9, 2026 at 04:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl Drop reference to syncobj and timeline fence when aborting the ioctl due output array being too small. (cherry picked from commit 68951e9c3e6bb22396bc42ef2359751c8315dd27)
Title drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:41.529Z

Reserved: 2026-05-01T14:12:56.007Z

Link: CVE-2026-43399

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:51.327

Modified: 2026-05-08T15:16:51.327

Link: CVE-2026-43399

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43399 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:00:10Z

Weaknesses