CVE-2025-37853: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: debugfs hang_hws skip GPU with MES debugfs hang_hws is used by GPU reset test with HWS, for MES this crash the kernel with NULL pointer access because dqm->packet_mgr is not setup for MES path. Skip GPU with MES for now, MES hang_hws debugfs interface will be supported later.
AI Analysis
Technical Summary
CVE-2025-37853 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem's AMD Kernel Fusion Driver (amdkfd) component. The issue arises in the debugfs interface related to the hang_hws (hang hardware scheduler) functionality used for GPU reset testing. The vulnerability occurs when the hang_hws debugfs interface is invoked on GPUs utilizing the Multi-Engine Scheduler (MES) feature. In this scenario, the kernel attempts to access a NULL pointer due to the dqm->packet_mgr structure not being properly initialized for the MES path. This results in a kernel crash, effectively causing a denial of service (DoS) condition. The current mitigation in the kernel source is to skip the GPU with MES when using the hang_hws debugfs interface, with plans to support MES hang_hws debugfs interface in the future. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel stability during GPU reset testing on systems with AMD GPUs that use MES. This flaw does not appear to allow privilege escalation or arbitrary code execution but can cause system crashes under certain debug operations.
Potential Impact
For European organizations, the primary impact of CVE-2025-37853 is the potential for denial of service due to kernel crashes on Linux systems running AMD GPUs with MES enabled, particularly during GPU reset testing or debugging activities. Organizations relying on Linux servers or workstations with AMD GPUs for compute-intensive tasks, graphics rendering, or GPU-accelerated workloads may experience system instability or downtime if this vulnerability is triggered. This could affect data center operations, cloud service providers, research institutions, and enterprises using Linux-based infrastructure. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt critical services, especially in environments where GPU debugging or reset testing is part of maintenance or troubleshooting. Since the issue is triggered via debugfs interfaces, exploitation requires local access and specific debug operations, limiting the attack surface. However, insider threats or misconfigured systems allowing untrusted users to access debugfs could be at risk. The absence of known exploits reduces immediate risk but patching is recommended to prevent potential future abuse.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the fix for CVE-2025-37853 to ensure the hang_hws debugfs interface properly skips GPUs with MES, preventing kernel crashes. 2. Restrict access to debugfs interfaces, especially hang_hws, to trusted administrators only, using appropriate filesystem permissions and mount options to minimize exposure. 3. Disable or limit the use of GPU reset testing and debugfs hang_hws functionality on production systems unless absolutely necessary for troubleshooting. 4. Monitor system logs for kernel crashes related to GPU reset operations and investigate any unusual debugfs activity. 5. For organizations using AMD GPUs with MES, validate GPU driver versions and kernel compatibility to ensure stable operation. 6. Implement strict local user access controls to prevent unauthorized users from triggering the vulnerable debugfs interface. 7. Maintain an inventory of Linux systems with AMD GPUs and MES enabled to prioritize patching and monitoring efforts. 8. Engage with Linux distribution vendors or kernel maintainers for timely updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-37853: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: debugfs hang_hws skip GPU with MES debugfs hang_hws is used by GPU reset test with HWS, for MES this crash the kernel with NULL pointer access because dqm->packet_mgr is not setup for MES path. Skip GPU with MES for now, MES hang_hws debugfs interface will be supported later.
AI-Powered Analysis
Technical Analysis
CVE-2025-37853 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem's AMD Kernel Fusion Driver (amdkfd) component. The issue arises in the debugfs interface related to the hang_hws (hang hardware scheduler) functionality used for GPU reset testing. The vulnerability occurs when the hang_hws debugfs interface is invoked on GPUs utilizing the Multi-Engine Scheduler (MES) feature. In this scenario, the kernel attempts to access a NULL pointer due to the dqm->packet_mgr structure not being properly initialized for the MES path. This results in a kernel crash, effectively causing a denial of service (DoS) condition. The current mitigation in the kernel source is to skip the GPU with MES when using the hang_hws debugfs interface, with plans to support MES hang_hws debugfs interface in the future. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel stability during GPU reset testing on systems with AMD GPUs that use MES. This flaw does not appear to allow privilege escalation or arbitrary code execution but can cause system crashes under certain debug operations.
Potential Impact
For European organizations, the primary impact of CVE-2025-37853 is the potential for denial of service due to kernel crashes on Linux systems running AMD GPUs with MES enabled, particularly during GPU reset testing or debugging activities. Organizations relying on Linux servers or workstations with AMD GPUs for compute-intensive tasks, graphics rendering, or GPU-accelerated workloads may experience system instability or downtime if this vulnerability is triggered. This could affect data center operations, cloud service providers, research institutions, and enterprises using Linux-based infrastructure. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt critical services, especially in environments where GPU debugging or reset testing is part of maintenance or troubleshooting. Since the issue is triggered via debugfs interfaces, exploitation requires local access and specific debug operations, limiting the attack surface. However, insider threats or misconfigured systems allowing untrusted users to access debugfs could be at risk. The absence of known exploits reduces immediate risk but patching is recommended to prevent potential future abuse.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the fix for CVE-2025-37853 to ensure the hang_hws debugfs interface properly skips GPUs with MES, preventing kernel crashes. 2. Restrict access to debugfs interfaces, especially hang_hws, to trusted administrators only, using appropriate filesystem permissions and mount options to minimize exposure. 3. Disable or limit the use of GPU reset testing and debugfs hang_hws functionality on production systems unless absolutely necessary for troubleshooting. 4. Monitor system logs for kernel crashes related to GPU reset operations and investigate any unusual debugfs activity. 5. For organizations using AMD GPUs with MES, validate GPU driver versions and kernel compatibility to ensure stable operation. 6. Implement strict local user access controls to prevent unauthorized users from triggering the vulnerable debugfs interface. 7. Maintain an inventory of Linux systems with AMD GPUs and MES enabled to prioritize patching and monitoring efforts. 8. Engage with Linux distribution vendors or kernel maintainers for timely updates and advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.955Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7cc0
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/4/2025, 12:27:14 AM
Last updated: 8/12/2025, 7:49:48 PM
Views: 15
Related Threats
CVE-2025-54205: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Sampler
MediumCVE-2025-54195: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54194: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54193: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54192: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.