VYPR
Medium severity5.5NVD Advisory· Published Apr 22, 2026· Updated May 7, 2026

CVE-2026-31462

CVE-2026-31462

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent immediate PASID reuse case

PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's.

(cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel drm/amdgpu driver could reuse PASIDs too quickly, causing pending page faults from a previous process to affect a new process, leading to interrupt issues.

Vulnerability

In the Linux kernel's AMDGPU DRM driver, a vulnerability exists in the handling of Process Address Space IDs (PASIDs). When a process exits and frees its PASID, it is possible that page faults are still pending in the interrupt handler (IH) ring buffer. If the same PASID is immediately reused by a new process, the new process may encounter hardware state left by the previous process, leading to interrupt issues [1].

Exploitation

The vulnerability can be triggered by a local attacker who can rapidly create and destroy processes that utilize the GPU via the amdgpu driver. The attack requires the ability to run code on the system and interact with the GPU hardware. No special privileges beyond local user access are needed, but the attacker must be able to cause PASID reuse before pending interrupts are drained.

Impact

A successful exploit could result in system instability or denial of service due to mishandled interrupts. The CVSS v3 score is 5.5 (Medium), indicating a moderate severity. There is no evidence of privilege escalation or data leakage from this vulnerability.

Mitigation

The fix changes the PASID allocator to use an IDR cyclic allocator, similar to kernel PID allocation, which prevents immediate reuse of PASIDs. This ensures that pending interrupts are cleared before a PASID is reassigned. The patch has been applied to the mainline kernel and backported to multiple stable kernel branches [1][2][3][4]. Users are advised to update their kernels to the latest patched versions.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6
  • Linux/Kernel6 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.15,<6.12.80
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.