CVE-2025-68793
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | amdgpu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's AMD GPU driver (amdgpu). It occurs due to a race condition between the GPU recovery process's scheduled timeout callback and the TDR (Timeout Detection and Recovery) work queue. Specifically, the GPU recovery function stops and restarts the scheduler queue, which can free a job object before the timeout callback finishes accessing it. If the job is freed too early, accessing its 'pasid' field results in a use-after-free error, potentially causing system instability or crashes.
How can this vulnerability impact me? :
This vulnerability can lead to system instability, crashes, or kernel panics due to the use-after-free condition in the GPU recovery process. It may affect the reliability of systems using the affected AMD GPU driver, potentially causing unexpected behavior or denial of service when the GPU recovery mechanism is triggered.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for KASAN (Kernel Address Sanitizer) slab-use-after-free errors related to the amdgpu driver, specifically messages indicating a use-after-free in amdgpu_device_gpu_recover. You can check the kernel logs using commands like 'dmesg | grep -i amdgpu' or 'journalctl -k | grep -i amdgpu' to look for such error traces.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which addresses the use-after-free condition in the amdgpu driver by caching the pasid early to avoid the race condition. Until the update is applied, monitoring for related kernel errors and avoiding workloads that trigger GPU recovery may reduce exposure.