CVE-2025-71293
NULL Pointer Dereference in AMDGPU Kernel Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | amdgpu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's AMD GPU driver (amdgpu), specifically in the ras (Reliability, Availability, and Serviceability) component. When the EEPROM contains only invalid address entries, the allocation of ras data is skipped, which leads to a NULL pointer dereference. This causes the kernel to crash with a NULL pointer dereference error, resulting in a kernel oops and potential system instability.
The issue arises because the allocation of ras data happens after a bad page check, and if the EEPROM is invalid, the allocation is skipped, causing the NULL pointer dereference. The fix moves the data allocation before the bad page check to prevent this problem.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference in the AMD GPU driver. Such crashes can lead to system instability, unexpected reboots, or denial of service conditions where the affected system becomes unresponsive or requires a restart.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel NULL pointer dereference related to the amdgpu driver, which can be detected by observing kernel logs for specific error messages.
- Check the kernel log for messages similar to: "BUG: kernel NULL pointer dereference, address: 0000000000000010" or "Oops: 0000 [#1] PREEMPT SMP NOPTI" referencing amdgpu_ras_sysfs_badpages_read.
- Use the command: dmesg | grep -i 'amdgpu' | grep -i 'NULL pointer' to filter relevant kernel errors.
- Monitor system logs (e.g., /var/log/kern.log or /var/log/messages) for similar error patterns indicating a NULL pointer dereference in the amdgpu driver.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by moving the ras data allocation before the bad page check in the amdgpu driver. Immediate mitigation involves updating the Linux kernel to a version that includes this fix.
- Apply the latest kernel updates or patches that address this specific amdgpu NULL pointer dereference issue.
- If updating immediately is not possible, consider disabling the amdgpu driver or related features temporarily to avoid triggering the vulnerability.
- Monitor kernel logs for signs of the issue and avoid workloads that may trigger the bad page check in the amdgpu driver.