CVE-2025-68230
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's AMD GPU driver (drm/amdgpu) in a PF passthrough environment. After the system hibernates and then resumes, a GPU page fault happens because the partition mode is not properly restored. Specifically, certain registers (mmCP_HYP_XCP_CTL and mmCP_PSP_XCP_CTL) are incorrect after resume, causing the compute partition to use a wrong stride size when accessing the MQD buffer object. This out-of-bound access leads to a GPU page fault. The fix involves ensuring that the function gfx_v9_4_3_switch_compute_partition() is called upon resume from hibernation to restore the partition mode correctly.
How can this vulnerability impact me? :
This vulnerability can cause GPU page faults after resuming from hibernation in environments using PF passthrough. This may lead to system instability, crashes, or degraded GPU performance, especially in systems relying on AMD GPUs with this driver. It could disrupt workflows that depend on GPU compute tasks and potentially cause data loss or interruption of services that utilize GPU acceleration.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Linux kernel is updated with the fix that calls gfx_v9_4_3_switch_compute_partition() when resuming from hibernation. This will prevent the GPU page fault caused by incorrect partition mode restoration after hibernation. Applying the relevant kernel patch or updating to a kernel version that includes this fix is recommended.