CVE-2025-37854

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix mode1 reset crash issue If HW scheduler hangs and mode1 reset is used to recover GPU, KFD signal user space to abort the processes. After process abort exit, user queues still use the GPU to access system memory before h/w is reset while KFD cleanup worker free system memory and free VRAM. There is use-after-free race bug that KFD allocate and reuse the freed system memory, and user queue write to the same system memory to corrupt the data structure and cause driver crash. To fix this race, KFD cleanup worker terminate user queues, then flush reset_domain wq to wait for any GPU ongoing reset complete, and then free outstanding BOs.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Nov 2025, 12:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-416
References () https://git.kernel.org/stable/c/57c9dabda80ac167de8cd71231baae37cc2f442d - () https://git.kernel.org/stable/c/57c9dabda80ac167de8cd71231baae37cc2f442d - Patch
References () https://git.kernel.org/stable/c/6f30a847432cae84c7428e9b684b3e3fa49b2391 - () https://git.kernel.org/stable/c/6f30a847432cae84c7428e9b684b3e3fa49b2391 - Patch
References () https://git.kernel.org/stable/c/89af6b39f028c130d4362f57042927f005423e6a - () https://git.kernel.org/stable/c/89af6b39f028c130d4362f57042927f005423e6a - Patch
References () https://git.kernel.org/stable/c/9c4bcdf4068aae3e17e31c144300be405cfa03ff - () https://git.kernel.org/stable/c/9c4bcdf4068aae3e17e31c144300be405cfa03ff - Patch
References () https://git.kernel.org/stable/c/f0b4440cdc1807bb6ec3dce0d6de81170803569b - () https://git.kernel.org/stable/c/f0b4440cdc1807bb6ec3dce0d6de81170803569b - Patch
References () https://git.kernel.org/stable/c/ffd37d7d44d7e0b6e769d4fe6590e327f8cc3951 - () https://git.kernel.org/stable/c/ffd37d7d44d7e0b6e769d4fe6590e327f8cc3951 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Debian
Debian debian Linux
Linux

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

Information

Published : 2025-05-09 07:16

Updated : 2025-11-17 12:51


NVD link : CVE-2025-37854

Mitre link : CVE-2025-37854

CVE.ORG link : CVE-2025-37854


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-416

Use After Free