CVE-2025-39706
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
05/09/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdkfd: Destroy KFD debugfs after destroy KFD wq<br />
<br />
Since KFD proc content was moved to kernel debugfs, we can&#39;t destroy KFD<br />
debugfs before kfd_process_destroy_wq. Move kfd_process_destroy_wq prior<br />
to kfd_debugfs_fini to fix a kernel NULL pointer problem. It happens<br />
when /sys/kernel/debug/kfd was already destroyed in kfd_debugfs_fini but<br />
kfd_process_destroy_wq calls kfd_debugfs_remove_process. This line<br />
debugfs_remove_recursive(entry->proc_dentry);<br />
tries to remove /sys/kernel/debug/kfd/proc/ while<br />
/sys/kernel/debug/kfd is already gone. It hangs the kernel by kernel<br />
NULL pointer.<br />
<br />
(cherry picked from commit 0333052d90683d88531558dcfdbf2525cc37c233)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.19 (including) | 6.1.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2e58401a24e7b2d4ec619104e1a76590c1284a4c
- https://git.kernel.org/stable/c/74ee7445c3b61c3bd899a54bd82c1982cb3a8206
- https://git.kernel.org/stable/c/910735ded17cc306625e7e1cdcc8102f7ac60994
- https://git.kernel.org/stable/c/96609a51e6134542bf90e053c2cd2fe4f61ebce3
- https://git.kernel.org/stable/c/fc35c955da799ba62f6f977d58e0866d0251e3f8
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



