CVE-2026-31462
drm/amdgpu: prevent immediate PASID reuse case
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent immediate PASID reuse case PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's. (cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 22, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c0b3882836de8ac991b626823966f385555bbcff 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 51ccaf0e30c303149244c34820def83d74c86288 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9e5ebfe99b223bb0eb9c50a125c9c02f4ef4c71b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 14b81abe7bdc25f8097906fc2f91276ffedb2d26
Linux / Linux
All versions affected References
git.kernel.org: https://git.kernel.org/stable/c/c0b3882836de8ac991b626823966f385555bbcff git.kernel.org: https://git.kernel.org/stable/c/51ccaf0e30c303149244c34820def83d74c86288 git.kernel.org: https://git.kernel.org/stable/c/9e5ebfe99b223bb0eb9c50a125c9c02f4ef4c71b git.kernel.org: https://git.kernel.org/stable/c/14b81abe7bdc25f8097906fc2f91276ffedb2d26