CVE-2025-37853
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's AMD GPU driver (drm/amdkfd) allows local attackers to crash the kernel when accessing the debugfs hang_hws interface on systems with MES (Micro-Engine Scheduler) enabled. This affects Linux systems with AMD GPUs using the MES path. The vulnerability requires local access to debugfs.
💻 Affected Systems
- Linux kernel with AMD GPU driver (drm/amdkfd)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local denial of service causing kernel panic and system crash, potentially leading to data loss or service disruption.
Likely Case
Local denial of service through kernel crash when malicious user accesses debugfs interface.
If Mitigated
No impact if debugfs access is restricted or MES is not used.
🎯 Exploit Status
Exploitation requires local access to debugfs interface. Simple trigger via debugfs access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions containing the stable commits listed in references
Vendor Advisory: https://git.kernel.org/stable/c/1a322b330dc0b775d1d7a84e55c752d9451bfe7d
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fixes. 2. Reboot system. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable debugfs access
linuxRestrict access to debugfs to prevent exploitation
mount -o remount,nodev,noexec,nosuid /sys/kernel/debug
Disable MES if not needed
linuxDisable Micro-Engine Scheduler if not required for GPU operations
echo 0 > /sys/module/amdgpu/parameters/mes
🧯 If You Can't Patch
- Restrict debugfs access to root only using mount options
- Implement strict user privilege separation to limit debugfs access
🔍 How to Verify
Check if Vulnerable:
Check if system has AMD GPU with MES enabled and debugfs accessible: lsmod | grep amdgpu && cat /sys/module/amdgpu/parameters/mes
Check Version:
uname -r
Verify Fix Applied:
Check kernel version contains fix commits: uname -r && zgrep -i '1a322b330dc0b775d1d7a84e55c752d9451bfe7d\|24b9e0e2e6147314c22d821f0542c4dd9a320c40\|a36f8d544522a19ef06ed9e84667d154dcb6be52\|f84c57906f0fd2185e557d2552b20aa8430a4677\|fe9d0061c413f8fb8c529b18b592b04170850ded' /proc/config.gz
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning NULL pointer dereference in drm/amdkfd
- System crash logs with amdgpu or kfd modules
Network Indicators:
- None - local vulnerability only
SIEM Query:
event_source="kernel" AND (message CONTAINS "NULL pointer dereference" OR message CONTAINS "amdgpu" OR message CONTAINS "kfd")
🔗 References
- https://git.kernel.org/stable/c/1a322b330dc0b775d1d7a84e55c752d9451bfe7d
- https://git.kernel.org/stable/c/24b9e0e2e6147314c22d821f0542c4dd9a320c40
- https://git.kernel.org/stable/c/a36f8d544522a19ef06ed9e84667d154dcb6be52
- https://git.kernel.org/stable/c/f84c57906f0fd2185e557d2552b20aa8430a4677
- https://git.kernel.org/stable/c/fe9d0061c413f8fb8c529b18b592b04170850ded