Description
In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Fix runtime suspend deadlock when there is pending job

The runtime suspend callback drains the running job workqueue before
suspending the device. If a job is still executing and calls
pm_runtime_resume_and_get(), it can deadlock with the runtime suspend
path.

Fix this by moving pm_runtime_resume_and_get() from the job execution
routine to the job submission routine, ensuring the device is resumed
before the job is queued and avoiding the deadlock during runtime
suspend.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The report details a deadlock flaw in the AMD X‑DNA accelerator driver for the Linux kernel. When the driver’s runtime suspend callback drains the job workqueue before suspending the device, a running job that calls pm_runtime_resume_and_get() can re‑enter the suspend path. The two code paths can block each other, preventing the device from completing suspend or resume operations and potentially halting workloads that depend on the accelerator. The weakness is a concurrency defect described by CWE‑367. No code execution path is exposed, so the impact is limited to a local DoS on the affected device.

Affected Systems

All Linux kernel releases that contain the AMD X‑DNA driver before inclusion of commit 6b13cb8f48a42ddf6dd98865b673a82e37ff238b are affected. That encompasses every kernel version shipped with the driver code prior to that commit, across all mainline distributions. The vulnerability applies only to systems with an AMD X‑DNA accelerator and the associated driver present.

Risk and Exploitability

EPSS data indicates a low probability of exploitation, with a score of less than 1%, and the vulnerability is not listed in CISA KEV, indicating no known active exploitation. The description implies that an attacker would need the ability to submit jobs to the device, which typically requires local or privileged access; this inference is not explicitly stated but follows from the need for job execution. Exploitation would therefore result in a denial of service for the device and any user workloads that rely on it, without providing remote code execution or data exfiltration capabilities.

Generated by OpenCVE AI on May 9, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a version that incorporates commit 6b13cb8f48a42ddf6dd98865b673a82e37ff238b or a later release, ensuring the driver contains the reordered pm_runtime_resume_and_get() call.
  • If a patched kernel is not immediately available, cherry‑pick the patch from the commit into your current kernel source, rebuild the kernel, and reboot so that the updated driver module is loaded.
  • As a temporary workaround, disable runtime autosuspend for the AMD X‑DNA device or unload the driver entirely until the patch is applied.

Generated by OpenCVE AI on May 9, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-417

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-417

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix runtime suspend deadlock when there is pending job The runtime suspend callback drains the running job workqueue before suspending the device. If a job is still executing and calls pm_runtime_resume_and_get(), it can deadlock with the runtime suspend path. Fix this by moving pm_runtime_resume_and_get() from the job execution routine to the job submission routine, ensuring the device is resumed before the job is queued and avoiding the deadlock during runtime suspend.
Title accel/amdxdna: Fix runtime suspend deadlock when there is pending job
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:13.328Z

Reserved: 2026-05-01T14:12:56.010Z

Link: CVE-2026-43446

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:57.113

Modified: 2026-05-08T15:16:57.113

Link: CVE-2026-43446

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43446 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:00:13Z

Weaknesses