Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl Drop reference to syncobj and timeline fence when aborting the ioctl due output array being too small. (cherry picked from commit 68951e9c3e6bb22396bc42ef2359751c8315dd27)

PUBLISHED Reserved 2026-05-01 | Published 2026-05-08 | Updated 2026-05-08 | Assigner Linux

Product status

Default status
unaffected

a292fdecd72834b3bec380baa5db1e69e7f70679 (git) before 762f47e2b824383d5be65eee2c40a1269b7d50c8
affected

a292fdecd72834b3bec380baa5db1e69e7f70679 (git) before 5409247d41f372bec5b141ef599f2d9f5e81b746
affected

a292fdecd72834b3bec380baa5db1e69e7f70679 (git) before 49abfa812617a7f2d0132c70d23ac98b389c6ec1
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.18.19 (semver)
unaffected

6.19.9 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/762f47e2b824383d5be65eee2c40a1269b7d50c8

git.kernel.org/...c/5409247d41f372bec5b141ef599f2d9f5e81b746

git.kernel.org/...c/49abfa812617a7f2d0132c70d23ac98b389c6ec1

cve.org (CVE-2026-43399)

nvd.nist.gov (CVE-2026-43399)

Download JSON