CVE-2026-43498
ivpu GEM Buffer Re-exportation Vulnerability
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's accel/ivpu component. It involves the re-exporting of imported GEM (Graphics Execution Manager) buffers, which was previously allowed.
The issue arises because re-exporting imported GEM buffers causes loss of buffer flags settings. This can lead to incorrect device access and data corruption.
The vulnerability was resolved by disallowing the re-exporting of imported GEM objects through a custom prime_handle_to_fd callback that checks if the object is imported and returns an error (-EOPNOTSUPP) if so.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause loss of buffer flags settings in the Linux kernel's graphics subsystem.
This loss can lead to incorrect device access, which might cause devices to behave unexpectedly or insecurely.
Additionally, it can result in data corruption, potentially affecting the integrity of data processed or displayed by the device.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by disallowing the re-exporting of imported GEM buffers through a custom prime_handle_to_fd callback.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.