CVE-2026-23358
Use-After-Free in Linux Kernel AMDGPU Slot Reset Error Handling
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.16.1 (inc) to 6.18.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's drm/amdgpu component related to error handling during a slot reset. If the device does not recover after a slot reset, the error handling code may access an uninitialized list due to an uninitialized hive pointer. This improper initialization can lead to incorrect behavior or potential crashes.
How can this vulnerability impact me? :
The vulnerability can cause the system to behave unpredictably or crash when error handling is triggered during a slot reset in the drm/amdgpu driver. This could lead to system instability or denial of service conditions if the device fails to recover properly.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by fixing error handling in the drm/amdgpu component of the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix (cherry picked from commit bb71362182e59caa227e4192da5a612b09349696). This ensures proper initialization of the list and hive pointers during error handling and releases the reset domain lock correctly.