PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-43370 Git CVE debrief

CVE-2026-43370 is a Linux kernel vulnerability in the AMDGPU DRM path. The published description says a non-atomic vm->process_info assignment allowed a race when parent and child processes sharing the same drm_file both tried to acquire the same VM after fork(). The fix replaces that assignment with cmpxchg() to make acquisition atomic and prevent the use-after-free condition. NVD classifies the issue as locally exploitable with high confidentiality, integrity, and availability impact.

Vendor
Git
Product
Unknown
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-08
Original CVE updated
2026-05-11
Advisory published
2026-05-08
Advisory updated
2026-05-11

Who should care

Linux kernel maintainers, distro security teams, and administrators of systems that use the AMDGPU driver—especially multi-user workstations or hosts where local users may run untrusted code.

Technical summary

According to the CVE description, the bug is a race condition in drm/amdgpu VM acquisition. Because vm->process_info was assigned non-atomically, two related processes sharing a drm_file after fork() could contend for the same VM and trigger a use-after-free. The resolved change uses cmpxchg() to serialize ownership changes and avoid the race.

Defensive priority

High for systems with AMDGPU support and local user exposure. The CVSS vector provided by NVD is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating a serious local-impact issue even though it is not network exploitable.

Recommended defensive actions

  • Apply the kernel update or stable backport that includes the VM acquire race fix.
  • Prioritize patching systems that allow untrusted local accounts, developer workstations, and multi-user desktop environments.
  • Confirm your kernel build includes the AMDGPU fix by checking vendor advisories or the linked stable kernel commit references.
  • After updating, watch for kernel warnings, GPU driver resets, or other regressions during validation on AMDGPU systems.
  • Use least-privilege access controls for local accounts until remediation is complete.

Evidence notes

This debrief is based only on the supplied CVE metadata and NVD-listed references. The key technical facts come from the CVE description: a non-atomic vm->process_info assignment in drm/amdgpu VM acquire, a race after fork() between parent and child processes sharing a drm_file, and remediation via cmpxchg(). The CVSS vector supplied by NVD is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

Official resources

Publicly disclosed in the CVE record on 2026-05-08 and last modified on 2026-05-11. This summary uses only the published CVE metadata and official NVD/kernel references in the supplied corpus.