CVE-2026-31462 PUBLISHED

drm/amdgpu: prevent immediate PASID reuse case

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent immediate PASID reuse case

PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's.

(cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to c0b3882836de8ac991b626823966f385555bbcff (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 51ccaf0e30c303149244c34820def83d74c86288 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 9e5ebfe99b223bb0eb9c50a125c9c02f4ef4c71b (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 14b81abe7bdc25f8097906fc2f91276ffedb2d26 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References