In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings
Userspace can either deliberately pass in the too small num_fences, or the
required number can legitimately grow between the two calls to the userq
wait ioctl. In both cases we do not want the emit the kernel warning
backtrace since nothing is wrong with the kernel and userspace will simply
get an errno reported back. So lets simply drop the WARN_ONs.
(cherry picked from commit 2c333ea579de6cc20ea7bc50e9595ef72863e65c)
CVE-2026-23338
NONE
EPSS 0.02%
Updated Mar 25, 2026
Linux
https://git.kernel.org/stable/c/1753f5f81ab60a553287f9ee659a6ac363adf8d7
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/7321302edca3a349ddaea689df95b986beee6c4a
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/7b7d7693a55d606d700beb9549c9f7f0e5d9c24f
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE Details
CVE ID
CVE-2026-23338
Published Date
Mar 25, 2026
Vendor
Linux
Severity
NONE
Exploit Prediction (EPSS)
Probability of Exploit
0.02%
Likelihood of exploitation in next 30 days
Percentile:
5.8th percentile (higher than 5.8% of all CVEs)
Standard patching cycle
Impact
Minimal impact
Source
View Advisory