CVE-2026-31766 PUBLISHED

drm/amdgpu: validate doorbell_offset in user queue creation

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate doorbell_offset in user queue creation

amdgpu_userq_get_doorbell_index() passes the user-provided doorbell_offset to amdgpu_doorbell_index_on_bar() without bounds checking. An arbitrarily large doorbell_offset can cause the calculated doorbell index to fall outside the allocated doorbell BO, potentially corrupting kernel doorbell space.

Validate that doorbell_offset falls within the doorbell BO before computing the BAR index, using u64 arithmetic to prevent overflow.

(cherry picked from commit de1ef4ffd70e1d15f0bf584fd22b1f28cbd5e2ec)

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from f09c1e6077abd1bc2ddd2b97e1135215801ca7f9 to 3543005a42d7e8e12b21897ef6798541bf7cbcd3 (excl.)
  • affected from f09c1e6077abd1bc2ddd2b97e1135215801ca7f9 to 86b732fbc37ce4fb76cdd4af0fb7e30a6acdbce6 (excl.)
  • affected from f09c1e6077abd1bc2ddd2b97e1135215801ca7f9 to a018d1819f158991b7308e4f74609c6c029b670c (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.16 is affected
  • unaffected from 0 to 6.16 (excl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References