CVE-2026-31462

medium

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent immediate PASID reuse case PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PASID, it's possible that page faults are still pending in the IH ring buffer when the process exits and frees up its PASID. To prevent the case, it uses idr cyclic allocator same as kernel pid's. (cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)

References

https://git.kernel.org/stable/c/c0b3882836de8ac991b626823966f385555bbcff

https://git.kernel.org/stable/c/9e5ebfe99b223bb0eb9c50a125c9c02f4ef4c71b

https://git.kernel.org/stable/c/51ccaf0e30c303149244c34820def83d74c86288

https://git.kernel.org/stable/c/14b81abe7bdc25f8097906fc2f91276ffedb2d26

Details

Source: Mitre, NVD

Published: 2026-04-22

Updated: 2026-04-23

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018