CVE-2026-43287
Received Received - Intake
Memory Accounting Bypass in Linux Kernel DRM

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm: Account property blob allocations to memcg DRM_IOCTL_MODE_CREATEPROPBLOB allows userspace to allocate arbitrary-sized property blobs backed by kernel memory. Currently, the blob data allocation is not accounted to the allocating process's memory cgroup, allowing unprivileged users to trigger unbounded kernel memory consumption and potentially cause system-wide OOM. Mark the property blob data allocation with GFP_KERNEL_ACCOUNT so that the memory is properly charged to the caller's memcg. This ensures existing cgroup memory limits apply and prevents uncontrolled kernel memory growth without introducing additional policy or per-file limits.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's DRM subsystem, specifically related to the DRM_IOCTL_MODE_CREATEPROPBLOB ioctl call. It allows userspace programs to allocate property blobs of arbitrary size backed by kernel memory.

The issue is that the allocated blob data is not properly accounted to the memory cgroup (memcg) of the allocating process. This means that unprivileged users can cause the kernel to consume an unlimited amount of memory without restriction.

The fix involves marking the property blob data allocation with GFP_KERNEL_ACCOUNT so that the memory usage is correctly charged to the caller's memory cgroup. This ensures that existing memory limits apply and prevents uncontrolled kernel memory growth.


How can this vulnerability impact me? :

This vulnerability can allow an unprivileged user to trigger unbounded kernel memory consumption by allocating large property blobs without memory accounting.

As a result, this can lead to system-wide out-of-memory (OOM) conditions, potentially causing system instability, crashes, or denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure your Linux kernel is updated to a version where the drm: Account property blob allocations to memcg issue is resolved.

The fix involves marking the property blob data allocation with GFP_KERNEL_ACCOUNT so that memory is properly charged to the caller's memory cgroup, enforcing existing cgroup memory limits and preventing uncontrolled kernel memory growth.

Therefore, applying the latest kernel patches or upgrading to a fixed kernel version is the immediate step to prevent unprivileged users from causing unbounded kernel memory consumption and potential system-wide out-of-memory conditions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart