Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate user queue size constraints Add validation to ensure user queue sizes meet hardware requirements: - Size must be a power of two for efficient ring buffer wrapping - Size must be at least AMDGPU_GPU_PAGE_SIZE to prevent undersized allocations This prevents invalid configurations that could lead to GPU faults or unexpected behavior.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-07 | Assigner Linux

Product status

Default status
unaffected

fbf136b932358da1c65eb6fedd064a33a7a96aaa (git) before cf2a37be899dc1b01f53bf1d0157330eaf3e3f55
affected

fbf136b932358da1c65eb6fedd064a33a7a96aaa (git) before 9f6cc309cd15922fe58cab2dfa1b5993ad31dec7
affected

fbf136b932358da1c65eb6fedd064a33a7a96aaa (git) before 8079b87c02e531cc91601f72ea8336dd2262fdf1
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/cf2a37be899dc1b01f53bf1d0157330eaf3e3f55

git.kernel.org/...c/9f6cc309cd15922fe58cab2dfa1b5993ad31dec7

git.kernel.org/...c/8079b87c02e531cc91601f72ea8336dd2262fdf1

cve.org (CVE-2026-43195)

nvd.nist.gov (CVE-2026-43195)

Download JSON