The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43298

CVE-2026-43298: Linux Kernel Privilege Escalation Flaw

CVE-2026-43298 is a privilege escalation vulnerability in the Linux kernel affecting the drm/amdgpu driver. This flaw impacts VCN poison IRQ handling in virtual functions. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: May 18, 2026

CVE-2026-43298 Overview

CVE-2026-43298 is a medium-severity vulnerability in the Linux kernel's AMD GPU driver (amdgpu). The flaw resides in the VCN (Video Core Next) version 2.5 deinitialization path. When the driver runs inside a virtual function (VF), it attempts to release a VCN poison interrupt request (IRQ) that was never enabled on the VF. This triggers a WARNING in amdgpu_irq_put at amdgpu_irq.c:641 during module unload, producing a call trace through vcn_v2_5_hw_fini. The result is a kernel warning and potential disruption to driver teardown on AMD GPU instances exposed via SR-IOV virtualization.

Critical Impact

A local user with the ability to unload the amdgpu driver inside a guest VM can trigger a kernel warning and disrupt clean GPU driver deinitialization, impacting availability.

Affected Products

  • Linux Kernel with amdgpu driver supporting VCN v2.5
  • Linux guest virtual machines using AMD GPU SR-IOV virtual functions
  • Distributions shipping kernels prior to the upstream stable fix commits

Discovery Timeline

  • 2026-05-08 - CVE-2026-43298 published to NVD
  • 2026-05-15 - Last updated in NVD database

Technical Details for CVE-2026-43298

Vulnerability Analysis

The vulnerability lives in the AMD GPU kernel driver's VCN v2.5 hardware finalization routine (vcn_v2_5_hw_fini). During driver teardown, the routine calls amdgpu_irq_put to release the VCN poison IRQ. On a virtual function, this IRQ is never enabled because VF guests do not own the underlying physical interrupt source for poison events. Releasing an IRQ that was never put produces a WARN_ON at line 641 of amdgpu_irq.c.

The kernel log shows the warning during rmmod amdgpu:

WARNING: CPU: 3 PID: 1079 at amdgpu_irq.c:641 amdgpu_irq_put+0xc6/0xe0 [amdgpu]
Call Trace: vcn_v2_5_hw_fini+0x19e/0x1e0 [amdgpu]

The condition affects availability rather than confidentiality or integrity. The CVSS vector indicates a local attack with low privilege requirements and high availability impact.

Root Cause

The root cause is a missing guest-context check before releasing the VCN poison interrupt. The driver assumes the poison IRQ was registered and enabled during initialization, but VCN v2.5 does not enable this IRQ on VFs. The asymmetry between the init and fini paths causes the warning. This is a kernel driver logic flaw [CWE-NVD-noinfo].

Attack Vector

Exploitation requires local access on a Linux guest using an AMD GPU virtual function. A user with permission to load and unload the amdgpu module — typically root inside the VM — can trigger the warning by performing module unload or driver reset operations. Repeated triggering of kernel warnings can be used to flood logs or destabilize automated teardown sequences. There is no remote vector and no information disclosure.

No public proof-of-concept exists and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The EPSS probability reflects a very low likelihood of exploitation in the wild.

Detection Methods for CVE-2026-43298

Indicators of Compromise

  • Kernel ring buffer entries containing WARNING: ... amdgpu_irq_put followed by a call trace through vcn_v2_5_hw_fini.
  • Repeated rmmod amdgpu or driver reset events on virtualized hosts running AMD VCN v2.5 hardware.
  • Tainted: G OE flags appearing in dmesg after AMD GPU driver teardown on a VM.

Detection Strategies

  • Monitor dmesg and /var/log/kern.log for the specific amdgpu_irq_put warning signature on guests exposed to AMD SR-IOV GPUs.
  • Compare installed kernel versions against the fixed upstream commits 8980be03b3f9, 8ee9aa80d4f1, and f1db6fc5a834.
  • Alert on unexpected amdgpu module unload events from non-administrative sessions inside guest VMs.

Monitoring Recommendations

  • Forward kernel logs from virtualized GPU workloads to a centralized log platform and create rules for the amdgpu_irq_put warning.
  • Track GPU driver version and kernel build inventory across virtualized fleets to identify unpatched hosts.
  • Audit which guest users hold CAP_SYS_MODULE since module loading and unloading is required to trigger the condition.

How to Mitigate CVE-2026-43298

Immediate Actions Required

  • Apply the upstream stable kernel patches referenced in the Linux Kernel Commit 8980be03b3f9, Linux Kernel Commit 8ee9aa80d4f1, and Linux Kernel Commit f1db6fc5a834.
  • Update to a distribution kernel that incorporates the fix and reboot affected guest VMs.
  • Restrict the ability to unload the amdgpu module to trusted administrators only.

Patch Information

The upstream fix modifies vcn_v2_5_hw_fini to skip calling amdgpu_irq_put for the VCN poison IRQ when running on a virtual function. Three stable-tree commits were published on git.kernel.org. Linux distribution vendors will backport this patch into their stable kernel update streams. Verify the active kernel after upgrade with uname -r and confirm the amdgpu module version matches the patched build.

Workarounds

  • Avoid unloading the amdgpu driver on guest VMs using AMD SR-IOV until the patched kernel is deployed.
  • Limit CAP_SYS_MODULE and root access inside guest VMs to reduce who can trigger driver teardown.
  • Suppress the specific warning in monitoring pipelines only as a temporary measure while patching is scheduled.
bash
# Verify running kernel and amdgpu module status
uname -r
modinfo amdgpu | grep -E 'version|srcversion'

# Check for the warning signature in kernel logs
dmesg | grep -A 20 'amdgpu_irq_put'

# After applying the patched kernel, reboot and re-verify
sudo reboot

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Linux Kernel Commit

  • Linux Kernel Commit

  • Linux Kernel Commit
  • Related CVEs
  • CVE-2026-43347: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43289: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-43463: Linux Kernel Privilege Escalation Bug

  • CVE-2026-43391: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English