๐Ÿ” CVE Alert

CVE-2026-43398

UNKNOWN 0.0

drm/amdgpu: add upper bound check on user inputs in wait ioctl

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value against AMDGPU_USERQ_MAX_HANDLES which is big enough value for genuine use cases and could potentially avoid OOM. v2: squash in Srini's fix (cherry picked from commit fcec012c664247531aed3e662f4280ff804d1476)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b1d10508da559da2e0ca9cca6505094a7df948e1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3cd93bc695b3456f26f5ed52753d9071da26202a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 64ac7c09fc44985ec9bb6a9db740899fa40ca613
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b1d10508da559da2e0ca9cca6505094a7df948e1 git.kernel.org: https://git.kernel.org/stable/c/3cd93bc695b3456f26f5ed52753d9071da26202a git.kernel.org: https://git.kernel.org/stable/c/64ac7c09fc44985ec9bb6a9db740899fa40ca613