CVE-2025-40288
BaseFortify
Publication date: 2025-12-06
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's AMDGPU driver affecting APU devices. Specifically, the VRAM manager's backing device pointer (man->bdev) remains uninitialized (NULL) on APUs because they lack dedicated VRAM and do not fully set up VRAM manager structures. When the function ttm_resource_manager_usage() tries to access man->bdev->lru_lock, it dereferences a NULL pointer, causing a kernel crash (OOPS). The fix involves adding checks to ensure the VRAM manager is initialized before accessing its members, preventing the NULL dereference.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel OOPS) on systems using APU devices with the affected Linux kernel. Such crashes can lead to system instability, unexpected reboots, or denial of service, impacting system availability and reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the NULL pointer dereference in the VRAM logic for APU devices. The fix involves using the ttm_resource_manager_used() function to check the validity of the VRAM manager before accessing its members, preventing kernel OOPS caused by uninitialized VRAM managers on APU platforms. Applying the updated kernel will prevent the NULL pointer dereference by ensuring proper checks are in place.