Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add upper bound check on user inputs in signal ioctl

Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and
could be exploited.

So check these input value against AMDGPU_USERQ_MAX_HANDLES
which is big enough value for genuine use cases and could
potentially avoid OOM.

(cherry picked from commit be267e15f99bc97cbe202cd556717797cdcf79a5)
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the amdgpu driver’s ioctl handler allows callers to provide arbitrarily large numerical values that cause the kernel to allocate memory until the system runs out of memory, triggering OOM killers and crashing the system. The weakness is an input validation failure that can be abused to exhaust system resources, resulting in availability loss for the affected host. This vulnerability a classic example of uncontrolled resource consumption.

Affected Systems

The vulnerability affects the Linux kernel and its AMDGPU DRM driver. No specific kernel version ranges are cited, so any version that includes the exposed code path before the upper‑bound check is vulnerable. Administrators should verify whether their installed kernel has been patched with the fix present in the 46630d966b99b0fc6cb01fef4110587f3375a0c0 commit or later.

Risk and Exploitability

The CVSS score is not provided in the data, and the EPSS score is unavailable, so precise exploitation likelihood cannot be quantified from the available information. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local use of the amdgpu ioctl interface, implying that a user with access to the relevant device files could trigger the flaw. Exploitation would require the attacker to construct a privileged or otherwise capable user context to invoke the ioctl with oversized arguments.

Generated by OpenCVE AI on May 9, 2026 at 05:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel version that contains the commit adding the upper‑bound check for amdgpu_userq_signal_ioctl.
  • If you compile your own kernel, cherry‑pick the commit SHA 46630d966b99b0fc6cb01fef4110587f3375a0c0 (or the equivalent later commit) into the kernel source and rebuild it.
  • Consider disabling or restricting the AMDGPU DRM device access for untrusted users by adjusting /dev/dri/card* permissions so that only privileged processes can call the ioctl.
  • Limit or monitor memory usage on the system and configure OOM settings to reduce the impact of any potential abuse of the driver.

Generated by OpenCVE AI on May 9, 2026 at 05:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input value against AMDGPU_USERQ_MAX_HANDLES which is big enough value for genuine use cases and could potentially avoid OOM. (cherry picked from commit be267e15f99bc97cbe202cd556717797cdcf79a5)
Title drm/amdgpu: add upper bound check on user inputs in signal ioctl
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:48.826Z

Reserved: 2026-05-01T14:12:56.007Z

Link: CVE-2026-43400

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:51.430

Modified: 2026-05-08T15:16:51.430

Link: CVE-2026-43400

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43400 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:30:16Z

Weaknesses