CVE-2026-31566

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib amdgpu_amdkfd_submit_ib() submits a GPU job and gets a fence from amdgpu_ib_schedule(). This fence is used to wait for job completion. Currently, the code drops the fence reference using dma_fence_put() before calling dma_fence_wait(). If dma_fence_put() releases the last reference, the fence may be freed before dma_fence_wait() is called. This can lead to a use-after-free. Fix this by waiting on the fence first and releasing the reference only after dma_fence_wait() completes. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c:697 amdgpu_amdkfd_submit_ib() warn: passing freed memory 'f' (line 696) (cherry picked from commit 8b9e5259adc385b61a6590a13b82ae0ac2bd3482)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

27 Apr 2026, 20:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/138e42be35ff2ce6572ae744de851ea286cf3c69 - () https://git.kernel.org/stable/c/138e42be35ff2ce6572ae744de851ea286cf3c69 - Patch
References () https://git.kernel.org/stable/c/39820864eacd886f1a6f817414fb8f9ea3e9a2b4 - () https://git.kernel.org/stable/c/39820864eacd886f1a6f817414fb8f9ea3e9a2b4 - Patch
References () https://git.kernel.org/stable/c/42d248726a0837640452b71c5a202ca3d35239ec - () https://git.kernel.org/stable/c/42d248726a0837640452b71c5a202ca3d35239ec - Patch
References () https://git.kernel.org/stable/c/7150850146ebfa4ca998f653f264b8df6f7f85be - () https://git.kernel.org/stable/c/7150850146ebfa4ca998f653f264b8df6f7f85be - Patch
References () https://git.kernel.org/stable/c/bc7760c107dc08ef3e231d72c492e67b0a86848b - () https://git.kernel.org/stable/c/bc7760c107dc08ef3e231d72c492e67b0a86848b - Patch
References () https://git.kernel.org/stable/c/e23602eb0779760544314ed3905fa6a89a4e4070 - () https://git.kernel.org/stable/c/e23602eb0779760544314ed3905fa6a89a4e4070 - Patch
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
CWE CWE-416
First Time Linux
Linux linux Kernel

27 Apr 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:32


NVD link : CVE-2026-31566

Mitre link : CVE-2026-31566

CVE.ORG link : CVE-2026-31566


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free