CVE-2026-31462
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: prevent immediate PASID reuse case
PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's.
(cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel drm/amdgpu driver could reuse PASIDs too quickly, causing pending page faults from a previous process to affect a new process, leading to interrupt issues.
Vulnerability
In the Linux kernel's AMDGPU DRM driver, a vulnerability exists in the handling of Process Address Space IDs (PASIDs). When a process exits and frees its PASID, it is possible that page faults are still pending in the interrupt handler (IH) ring buffer. If the same PASID is immediately reused by a new process, the new process may encounter hardware state left by the previous process, leading to interrupt issues [1].
Exploitation
The vulnerability can be triggered by a local attacker who can rapidly create and destroy processes that utilize the GPU via the amdgpu driver. The attack requires the ability to run code on the system and interact with the GPU hardware. No special privileges beyond local user access are needed, but the attacker must be able to cause PASID reuse before pending interrupts are drained.
Impact
A successful exploit could result in system instability or denial of service due to mishandled interrupts. The CVSS v3 score is 5.5 (Medium), indicating a moderate severity. There is no evidence of privilege escalation or data leakage from this vulnerability.
Mitigation
The fix changes the PASID allocator to use an IDR cyclic allocator, similar to kernel PID allocation, which prevents immediate reuse of PASIDs. This ensures that pending interrupts are cleared before a PASID is reassigned. The patch has been applied to the mainline kernel and backported to multiple stable kernel branches [1][2][3][4]. Users are advised to update their kernels to the latest patched versions.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
6cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.15,<6.12.80
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.