CVE-2026-23034Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 98.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 31

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode queue keeps a pointer to the most recent fence in userq->last_fence. This pointer holds an extra dma_fence reference. When the queue is destroyed, we free the fence driver and its xarray, but we forgot to drop the last_fence reference. Because of the missing dma_fence_put(), the last fence object can stay alive when the driver unloads. This leaves

Affected Packages4 packages

Linuxlinux/linux_kernel6.16.06.18.7
Debianlinux/linux_kernel< 6.18.8-1
CVEListV5linux/linuxedc762a51c7181d6fe1e0837e2eb69afb406f98ee1a30e1ab33fc522785d04bbf7e1b13a5c5c9175+2
debiandebian/linux< linux 6.18.8-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2026-23034: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode queu2026-01-31
OSV
drm/amdgpu/userq: Fix fence reference leak on queue teardown v22026-01-31
GHSA
GHSA-hv59-hh7h-7h9r: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode qu2026-01-31

📋Vendor Advisories

2
Red Hat
kernel: drm/amdgpu/userq: Fix fence reference leak on queue teardown v22026-01-31
Debian
CVE-2026-23034: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23034 Impact, Exploitability, and Mitigation Steps | Wiz