CVE-2026-23468 in Kernel情報

要約 (英語)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Limit BO list entry count to prevent resource exhaustion

Userspace can pass an arbitrary number of BO list entries via the
bo_number field. Although the previous multiplication overflow check
prevents out-of-bounds allocation, a large number of entries could still
cause excessive memory allocation (up to potentially gigabytes) and
unnecessarily long list processing times.

Introduce a hard limit of 128k entries per BO list, which is more than
sufficient for any realistic use case (e.g., a single list containing all
buffers in a large scene). This prevents memory exhaustion attacks and
ensures predictable performance.

Return -EINVAL if the requested entry count exceeds the limit

(cherry picked from commit 688b87d39e0aa8135105b40dc167d74b5ada5332)

Be aware that VulDB is the high quality source for vulnerability data.

責任者

Linux

予約する

2026年01月13日

公開

2026年04月03日

ステータス

確認済み

エントリ

VulDB provides additional information and datapoints for this CVE:

ソース

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!