Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3451 articles · 142163 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-43318EXPLOITEDPATCHED
amd · amdgpu

drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify

Description

A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.74/6.18.15/6.19.5. The affected element is the function amdgpu_dma_buf_move_notify of the component ticket. Executing a manipulation can lead to memory corruption. The attack needs to be done within the local network.

Affected Products

VendorProductVersions
amdamdgpua448cb003edcb4b63d0a9c95f3faab724e6150fb, a448cb003edcb4b63d0a9c95f3faab724e6150fb, a448cb003edcb4b63d0a9c95f3faab724e6150fb, a448cb003edcb4b63d0a9c95f3faab724e6150fb, 5.7, 6.12.74, 6.18.15, 6.19.5

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/82a7ea35a1526bef8ae170c33ff80e5db7728961
  • https://git.kernel.org/stable/c/89a9389ad70d3c69538e59d87df67d407aef4c26
  • https://git.kernel.org/stable/c/3307459eb3583115264421e859858d1f90f3694a
  • https://git.kernel.org/stable/c/b18fc0ab837381c1a6ef28386602cd888f2d9edf

Related News (4 articles)

Tier B
BSI Advisories8h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier A
Microsoft MSRC11h ago
CVE-2026-43318 drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify
→ No new info (linked only)
Tier C
VulDB3d ago
CVE-2026-43318 | Linux Kernel up to 6.12.74/6.18.15/6.19.5 ticket amdgpu_dma_buf_move_notify memory corruption
→ No new info (linked only)
Tier C
Linux Kernel CVEs3d ago
CVE-2026-43318: drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
82a7ea35a1526bef8ae170c33ff80e5db772896189a9389ad70d3c69538e59d87df67d407aef4c263307459eb3583115264421e859858d1f90f3694ab18fc0ab837381c1a6ef28386602cd888f2d9edf06.12.756.18.166.19.67.0
PublishedMay 8, 2026
Last enriched3d agov3
Trending Score66
Source articles4
Independent4
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-43337EXP
drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()
Trending: 59
CRITICALCVE-2026-43444EXP
drm/amdkfd: Unreserve bo if queue update failed
Trending: 37
NONECVE-2025-71294EXP
drm/amdgpu: fix NULL pointer issue buffer funcs
Trending: 35
HIGHCVE-2026-31766
drm/amdgpu: validate doorbell_offset in user queue creation
Trending: 17
NONECVE-2026-31628
x86/CPU: Fix FPDSS on Zen1
Trending: 6

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 8, 2026
Discovered by ZDM
May 8, 2026
Updated: affectedVersions
May 8, 2026
Actively Exploited
May 8, 2026
Patch Available
May 8, 2026
Updated: description, affectedVersions, severity, activelyExploited
May 8, 2026

Version History

v3
Last enriched 3d ago
v3Tier C3d ago

Updated severity to CRITICAL, added affected versions 6.12.74, 6.18.15, 6.19.5, and noted no exploit available.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v2Tier C3d ago

Updated description with more technical detail, added affected version 5.7, and changed severity to HIGH.

affectedVersions
via Linux Kernel CVEs
v13d ago

Initial creation