CVE-2026-43498
Received Received - Intake
ivpu GEM Buffer Re-exportation Vulnerability

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Disallow re-exporting imported GEM objects Prevent re-exporting of imported GEM buffers by adding a custom prime_handle_to_fd callback that checks if the object is imported and returns -EOPNOTSUPP if so. Re-exporting imported GEM buffers causes loss of buffer flags settings, leading to incorrect device access and data corruption.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-21
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's accel/ivpu component. It involves the re-exporting of imported GEM (Graphics Execution Manager) buffers, which was previously allowed.

The issue arises because re-exporting imported GEM buffers causes loss of buffer flags settings. This can lead to incorrect device access and data corruption.

The vulnerability was resolved by disallowing the re-exporting of imported GEM objects through a custom prime_handle_to_fd callback that checks if the object is imported and returns an error (-EOPNOTSUPP) if so.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause loss of buffer flags settings in the Linux kernel's graphics subsystem.

This loss can lead to incorrect device access, which might cause devices to behave unexpectedly or insecurely.

Additionally, it can result in data corruption, potentially affecting the integrity of data processed or displayed by the device.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been resolved in the Linux kernel by disallowing the re-exporting of imported GEM buffers through a custom prime_handle_to_fd callback.

To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart