CVE-2026-43169
DRM Buddy Memory Allocation Bypass
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's DRM (Direct Rendering Manager) buddy allocator. When certain allocation flags are set, the requested memory size is rounded up to the next power-of-two or aligned up to a block size. This rounding can cause the requested size to exceed the total available memory size (mm->size), which later triggers a kernel BUG_ON error, causing a crash.
The issue occurs because the code does not properly validate the rounded size against the available memory size before proceeding. For example, requesting 9GB on a 10GB VRAM with rounding can result in a 16GB allocation attempt, which is invalid.
The fix involves adding checks to ensure the rounded size does not exceed the available memory size. If it does, the allocation returns an error immediately instead of causing a kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a BUG_ON triggered by invalid memory allocation requests. Such crashes can lead to system instability, denial of service, or unexpected reboots.
If exploited or triggered by malformed input or software, it could disrupt services running on the affected system, potentially causing downtime or data loss.
What immediate steps should I take to mitigate this vulnerability?
This vulnerability has been resolved in the Linux kernel by adding validation to prevent invalid allocation sizes that trigger BUG_ON conditions.
Immediate mitigation steps include updating your Linux kernel to a version that contains the fix for this issue.
- Ensure that the kernel version you are running includes the patch that validates rounded allocation sizes against the memory manager's size.
- Avoid using configurations or workloads that request large contiguous or non-contiguous allocations that exceed available VRAM or memory size until the fix is applied.