CVE-2025-38011

MEDIUM

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: csa unmap use uninterruptible lock After process exit to unmap csa and free GPU vm, if signal is accepted and then waiting to take vm lock is interrupted and return, it causes memory leaking and below warning backtrace. Change to use uninterruptible wait lock fix the issue. WARNING: CPU: 69 PID: 167800 at amd/amdgpu/amdgpu_kms.c:1525 amdgpu_driver_postclose_kms+0x294/0x2a0 [amdgpu] Call Trace: <TASK> drm_file_free.part.0+0x1da/0x230 [drm] drm_close_helper.isra.0+0x65/0x70 [drm] drm_release+0x6a/0x120 [drm] amdgpu_drm_release+0x51/0x60 [amdgpu] __fput+0x9f/0x280 ____fput+0xe/0x20 task_work_run+0x67/0xa0 do_exit+0x217/0x3c0 do_group_exit+0x3b/0xb0 get_signal+0x14a/0x8d0 arch_do_signal_or_restart+0xde/0x100 exit_to_user_mode_loop+0xc1/0x1a0 exit_to_user_mode_prepare+0xf4/0x100 syscall_exit_to_user_mode+0x17/0x40 do_syscall_64+0x69/0xc0 (cherry picked from commit 7dbbfb3c171a6f63b01165958629c9c26abf38ab)

Scores

CVSS v3 5.5
EPSS 0.0007
EPSS Percentile 21.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-401
Status published
Products (15)
linux/Kernel 6.13.0 - 6.14.8linux
linux/Kernel 6.6.0 - 6.6.122linux
linux/Kernel 6.7.0 - 6.12.30linux
Linux/Linux < 6.6
Linux/Linux 6.12.30 - 6.12.*
Linux/Linux 6.14.8 - 6.14.*
Linux/Linux 6.15
Linux/Linux 6.6
Linux/Linux 6.6.122 - 6.6.*
Linux/Linux 8a206685d36f6f0c6b72637f920ef973ea9cc936 - 8d2979b9bb1be0f4a52dff600e56d780403e04ac
... and 5 more
Published Jun 18, 2025
Tracked Since Feb 18, 2026