CVE-2026-43370
Received Received - Intake
Use-After-Free Race in AMDGPU VM Acquisition in Linux Kernel

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix use-after-free race in VM acquire Replace non-atomic vm->process_info assignment with cmpxchg() to prevent race when parent/child processes sharing a drm_file both try to acquire the same VM after fork(). (cherry picked from commit c7c573275ec20db05be769288a3e3bb2250ec618)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a use-after-free race condition in the Linux kernel's drm/amdgpu driver. It occurs when parent and child processes that share a drm_file both try to acquire the same virtual memory (VM) after a fork() system call. The issue arises because the assignment to vm->process_info was non-atomic, allowing a race condition. The fix replaces this assignment with an atomic compare-and-exchange operation (cmpxchg) to prevent the race.


How can this vulnerability impact me? :

This use-after-free race condition could potentially lead to memory corruption or unexpected behavior in the drm/amdgpu driver when processes share a drm_file and attempt to acquire the same VM concurrently. Such issues might cause system instability, crashes, or security risks such as privilege escalation or information disclosure, depending on how the corrupted memory is exploited.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart