VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 11, 2026

CVE-2026-43195

CVE-2026-43195

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate user queue size constraints

Add validation to ensure user queue sizes meet hardware requirements: - Size must be a power of two for efficient ring buffer wrapping - Size must be at least AMDGPU_GPU_PAGE_SIZE to prevent undersized allocations

This prevents invalid configurations that could lead to GPU faults or unexpected behavior.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing validation in the Linux kernel's AMDGPU driver allows user queues with invalid sizes, potentially causing GPU faults or unexpected behavior.

Vulnerability

Overview

CVE-2026-43195 is a vulnerability in the Linux kernel's AMDGPU Direct Rendering Manager (drm) driver. The issue arises from a lack of validation for user queue sizes. The kernel now adds checks to ensure that the queue size is a power of two, which is necessary for efficient ring buffer wrapping, and that it is at least AMDGPU_GPU_PAGE_SIZE to prevent undersized allocations [1][2][3].

Exploitation

Conditions

An attacker with the ability to submit user queue creation requests to the AMDGPU driver could exploit this vulnerability. No special privileges beyond local user access to the GPU device are required. By providing a queue size that is not a power of two or is too small, the attacker can trigger a GPU fault or other unexpected behavior in the kernel driver [1][2][3].

Impact

Successful exploitation could lead to a denial of service (GPU fault) or potentially other undefined behavior in the GPU subsystem. The CVSS v3 base score is 5.5 (Medium), indicating a moderate severity with a requirement for local access and some user interaction [1][2][3].

Mitigation

The fix has been applied to the Linux kernel stable tree. Users should update to a kernel version containing the commit that adds the size validation checks. No workarounds are mentioned, but restricting local access to the GPU device can reduce the attack surface [1][2][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: >=6.16,<6.18.16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

1