CVE-2026-43318
Race Condition in AMDGPU DMA-BUF Sync Handling
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amdgpu | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's amdgpu driver, specifically in the handling of synchronization when moving dma buffers (dmabuf) shared between processes. When one process moves a buffer object (BO), it must notify other processes using that shared BO to update their page tables accordingly. The bug was caused by incorrect synchronization that made the system behave as if the page table update happened immediately, which is not always correct.
In a scenario involving two GPUs and applications like glxgears and Xorg running on different GPUs without peer-to-peer PCI support, the sequence of GPU jobs can lead to a situation where a blit job is still running on GPU0 while the buffer is being moved and page tables updated. This can cause a page fault due to the premature update.
How can this vulnerability impact me? :
This vulnerability can cause synchronization issues when multiple processes share and move buffer objects across GPUs. Specifically, it can lead to page faults during GPU operations, which may cause application crashes or instability in graphics rendering.
Such faults could degrade system performance or reliability, especially in environments relying on multi-GPU setups and shared buffers for graphics workloads.