CVE-2025-37854
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
09/05/2025
Last modified:
17/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdkfd: Fix mode1 reset crash issue<br />
<br />
If HW scheduler hangs and mode1 reset is used to recover GPU, KFD signal<br />
user space to abort the processes. After process abort exit, user queues<br />
still use the GPU to access system memory before h/w is reset while KFD<br />
cleanup worker free system memory and free VRAM.<br />
<br />
There is use-after-free race bug that KFD allocate and reuse the freed<br />
system memory, and user queue write to the same system memory to corrupt<br />
the data structure and cause driver crash.<br />
<br />
To fix this race, KFD cleanup worker terminate user queues, then flush<br />
reset_domain wq to wait for any GPU ongoing reset complete, and then<br />
free outstanding BOs.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.1.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/57c9dabda80ac167de8cd71231baae37cc2f442d
- https://git.kernel.org/stable/c/6f30a847432cae84c7428e9b684b3e3fa49b2391
- https://git.kernel.org/stable/c/89af6b39f028c130d4362f57042927f005423e6a
- https://git.kernel.org/stable/c/9c4bcdf4068aae3e17e31c144300be405cfa03ff
- https://git.kernel.org/stable/c/f0b4440cdc1807bb6ec3dce0d6de81170803569b
- https://git.kernel.org/stable/c/ffd37d7d44d7e0b6e769d4fe6590e327f8cc3951
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



