First published: Fri May 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Use local fence in error path of xe_migrate_clear The intent of the error path in xe_migrate_clear is to wait on locally generated fence and then return. The code is waiting on m->fence which could be the local fence but this is only stable under the job mutex leading to a possible UAF. Fix code to wait on local fence. (cherry picked from commit 762b7e95362170b3e13a8704f38d5e47eca4ba74)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37869 has been classified as a medium severity vulnerability in the Linux Kernel.
To fix CVE-2025-37869, you should update to the latest version of the Linux Kernel that includes the patch addressing this vulnerability.
CVE-2025-37869 could lead to potential race conditions in the error handling paths of specific operations in the Linux Kernel.
While direct exploits of CVE-2025-37869 have not been publicized, it is advisable to remediate the vulnerability to prevent potential exploitation.
CVE-2025-37869 impacts specific versions of the Linux Kernel, so it's essential to check the release notes for detailed information.