In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix mode1 reset crash issue
If HW scheduler hangs and mode1 reset is used to recover GPU, KFD signal
user space to abort the processes. After process abort exit, user queues
still use the GPU to access system memory before h/w is reset while KFD
cleanup worker free system memory and free VRAM.
There is use-after-free race bug that KFD allocate and reuse the freed
system memory, and user queue write to the same system memory to corrupt
the data structure and cause driver crash.
To fix this race, KFD cleanup worker terminate user queues, then flush
reset_domain wq to wait for any GPU ongoing reset complete, and then
free outstanding BOs.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Nov 2025, 12:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| CWE | CWE-416 | |
| References | () https://git.kernel.org/stable/c/57c9dabda80ac167de8cd71231baae37cc2f442d - Patch | |
| References | () https://git.kernel.org/stable/c/6f30a847432cae84c7428e9b684b3e3fa49b2391 - Patch | |
| References | () https://git.kernel.org/stable/c/89af6b39f028c130d4362f57042927f005423e6a - Patch | |
| References | () https://git.kernel.org/stable/c/9c4bcdf4068aae3e17e31c144300be405cfa03ff - Patch | |
| References | () https://git.kernel.org/stable/c/f0b4440cdc1807bb6ec3dce0d6de81170803569b - Patch | |
| References | () https://git.kernel.org/stable/c/ffd37d7d44d7e0b6e769d4fe6590e327f8cc3951 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux linux Kernel
Debian Debian debian Linux Linux |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-05-09 07:16
Updated : 2025-11-17 12:51
NVD link : CVE-2025-37854
Mitre link : CVE-2025-37854
CVE.ORG link : CVE-2025-37854
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-416
Use After Free
