CVE-2026-43298
Null Pointer Dereference in AMDGPU Kernel Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | amdgpu | From 2.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's AMD GPU driver (amdgpu). Specifically, it involves the handling of the VCN (Video Core Next) poison interrupt request (irq) in virtual functions (VF) of the GPU. In VCN version 2.5, the VF does not enable the VCN poison irq, but the driver was attempting to release it during deinitialization, which caused a call trace (a type of error or warning). The fix skips releasing the VCN poison irq when it was not enabled, preventing this error.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to system stability and reliability. If the driver attempts to release a VCN poison irq that was never enabled, it can cause warnings and call traces in the kernel logs, potentially leading to system instability or crashes during GPU deinitialization in virtualized environments using AMD GPUs. This could affect systems using virtual functions of AMD GPUs, possibly causing disruptions in GPU-related operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to the Linux kernel's amdgpu driver and manifests as a kernel warning and call trace during deinitialization of the VCN poison irq on virtual functions (VF).
To detect this vulnerability on your system, you can monitor the kernel logs for specific warning messages related to amdgpu_irq_put and VCN poison irq issues.
- Use the command: dmesg | grep -i amdgpu
- Check for kernel warnings or call traces similar to: "WARNING: CPU: ... amdgpu_irq_put" or messages mentioning "clean up the vf2pf work item".
- Alternatively, monitor system logs with: journalctl -k | grep amdgpu
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by skipping the release of the VCN poison irq on virtual functions that do not enable it, thereby avoiding the call trace during deinitialization.
Immediate mitigation steps include updating your Linux kernel to a version that contains the fix for this issue.
- Apply the latest kernel updates from your Linux distribution that address the amdgpu driver issue.
- If updating is not immediately possible, monitor kernel logs for the warning and avoid unloading the amdgpu module or performing operations that trigger the deinitialization of VCN poison irq on VFs.