First published: Fri May 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() Add error handling to propagate amdgpu_cgs_create_device() failures to the caller. When amdgpu_cgs_create_device() fails, release hwmgr and return -ENOMEM to prevent null pointer dereference. [v1]->[v2]: Change error code from -EINVAL to -ENOMEM. Free hwmgr.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >v1<=v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37852 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2025-37852, update your Linux kernel to the latest version where this vulnerability is patched.
The potential impact of CVE-2025-37852 includes instability in graphics processing or potential resource leaks due to improper error handling.
CVE-2025-37852 affects specific versions of the Linux kernel prior to the patch, particularly between versions v1 and v2.
While updating the kernel is the best solution, temporary workarounds may involve disabling certain functionalities reliant on affected components.