VYPR
Unrated severityNVD Advisory· Published May 8, 2026· Updated May 12, 2026

CVE-2026-43400

CVE-2026-43400

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add upper bound check on user inputs in signal ioctl

Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited.

So check these input value against AMDGPU_USERQ_MAX_HANDLES which is big enough value for genuine use cases and could potentially avoid OOM.

(cherry picked from commit be267e15f99bc97cbe202cd556717797cdcf79a5)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel GPU driver missing an upper bound check in amdgpu_userq_signal_ioctl could allow local DoS via OOM.

Vulnerability

CVE-2026-43400 is a denial-of the Linux kernel's AMDGPU driver lacks an upper bound check on user-supplied values in the amdgpu_userq_signal_ioctl ioctl handler. The kernel's official fix notes that huge input values can lead to an out-of-memory (OOM) condition, effectively enabling a local denial of service by exhausting system memory [1].

The patch introduces a validation step that caps input values at AMDGPU_USERQ_MAX_HANDLES, a limit chosen to accommodate legitimate use cases while preventing excessive memory allocation].

Exploitation

An attacker with local access to a system using the affected AMDGPU driver can invoke the ioctl with a maliciously large argument. No special privileges beyond the ability to open and interact with the GPU device are required the attack surface is the standard device file interface exposed to user space.

The vulnerability is triggered pre-authentication for the specific resource the attacker simply calls the ioctl with a crafted value; no other form of authentication is bypassed.

Impact

Successful exploitation causes the kernel to attempt allocating an extremely large buffer, leading to OOM-killing processes or crashing the system. This is a classic denial-of-service vector comparable to previous kernel resource-exhaustion CVE entries.

Mitigation

The fix has been committed to the Linux kernel stable tree and is included in upstream releases starting with the commit referenced]. System administrators should apply the latest kernel updates from their distribution. No workaround is available other than restricting local access to the amdgpu device, which is impractical in most desktop scenarios.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

1