CVE-2026-31462
PASID Reuse Vulnerability in Linux AMDGPU Causes Interrupt Issues
Publication date: 2026-04-22
Last updated on: 2026-04-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's drm/amdgpu component. It involves the reuse of a Process Address Space ID (PASID) immediately after a process exits. When a process exits, there may still be pending page faults in the Interrupt Handler (IH) ring buffer associated with that PASID. If the same PASID is immediately reused by a new process, it can cause interrupt issues because the hardware state left by the previous process is still active. The fix prevents this immediate reuse by using an idr cyclic allocator similar to the kernel's process ID allocator.
How can this vulnerability impact me? :
The vulnerability can cause interrupt handling issues in the Linux kernel when a PASID is reused immediately after a process exits. This could lead to instability or unexpected behavior in systems using the affected drm/amdgpu driver, potentially impacting system reliability or causing crashes related to GPU operations.