CVE-2026-43446
Runtime Suspend Deadlock in AMDXDNA Linux Kernel Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's amdxdna accelerator component. It involves a deadlock situation during runtime suspend when there is a pending job. Specifically, the runtime suspend callback tries to drain the running job workqueue before suspending the device. However, if a job is still executing and calls pm_runtime_resume_and_get(), it can cause a deadlock with the runtime suspend process.
The fix moves the pm_runtime_resume_and_get() call from the job execution routine to the job submission routine. This ensures the device is resumed before the job is queued, thereby avoiding the deadlock during runtime suspend.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel when the system attempts to suspend a device while a job is still running and interacting with power management routines. This deadlock can lead to system hangs or freezes during runtime suspend operations, potentially affecting system stability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where the runtime suspend deadlock in the accel/amdxdna driver is resolved.
Specifically, the fix involves moving the pm_runtime_resume_and_get() call from the job execution routine to the job submission routine to avoid deadlocks during runtime suspend.
Therefore, the immediate mitigation step is to apply the kernel update that includes this fix.