Linux Kernel amdgpu PASID Reuse Interrupt PrivEsc
CVE-2026-31462 Published on April 22, 2026
drm/amdgpu: prevent immediate PASID reuse case
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: prevent immediate PASID reuse case
PASID resue could cause interrupt issue when process
immediately runs into hw state left by previous
process exited with the same PASID, it's possible that
page faults are still pending in the IH ring buffer when
the process exits and frees up its PASID. To prevent the
case, it uses idr cyclic allocator same as kernel pid's.
(cherry picked from commit 8f1de51f49be692de137c8525106e0fce2d1912d)
Products Associated with CVE-2026-31462
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and below c0b3882836de8ac991b626823966f385555bbcff is affected.
- Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and below 51ccaf0e30c303149244c34820def83d74c86288 is affected.
- Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and below 9e5ebfe99b223bb0eb9c50a125c9c02f4ef4c71b is affected.
- Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and below 14b81abe7bdc25f8097906fc2f91276ffedb2d26 is affected.
- Version 6.12.80, <= 6.12.* is unaffected.
- Version 6.18.21, <= 6.18.* is unaffected.
- Version 6.19.11, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.