Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl Drop reference to syncobj and timeline fence when aborting the ioctl due output array being too small. (cherry picked from commit 68951e9c3e6bb22396bc42ef2359751c8315dd27)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.16, < 6.18.19 |
References
- https://git.kernel.org/stable/c/49abfa812617a7f2d0132c70d23ac98b389c6ec1Patch
- https://git.kernel.org/stable/c/5409247d41f372bec5b141ef599f2d9f5e81b746Patch
- https://git.kernel.org/stable/c/762f47e2b824383d5be65eee2c40a1269b7d50c8Patch
FAQ
What is CVE-2026-43399?
CVE-2026-43399 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl Drop reference to syncobj and timeline fence when aborting the ioc...
How severe is CVE-2026-43399?
CVE-2026-43399 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43399?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.