Impact
A flaw in the amdgpu driver’s ioctl handler allows callers to provide arbitrarily large numerical values that cause the kernel to allocate memory until the system runs out of memory, triggering OOM killers and crashing the system. The weakness is an input validation failure that can be abused to exhaust system resources, resulting in availability loss for the affected host. This vulnerability a classic example of uncontrolled resource consumption.
Affected Systems
The vulnerability affects the Linux kernel and its AMDGPU DRM driver. No specific kernel version ranges are cited, so any version that includes the exposed code path before the upper‑bound check is vulnerable. Administrators should verify whether their installed kernel has been patched with the fix present in the 46630d966b99b0fc6cb01fef4110587f3375a0c0 commit or later.
Risk and Exploitability
The CVSS score is not provided in the data, and the EPSS score is unavailable, so precise exploitation likelihood cannot be quantified from the available information. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local use of the amdgpu ioctl interface, implying that a user with access to the relevant device files could trigger the flaw. Exploitation would require the attacker to construct a privileged or otherwise capable user context to invoke the ioctl with oversized arguments.
OpenCVE Enrichment