Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37852
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-09 May, 2025 | 06:41
Updated At-02 Jan, 2026 | 15:29
Rejected At-
▼CVE Numbering Authority (CNA)
drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() Add error handling to propagate amdgpu_cgs_create_device() failures to the caller. When amdgpu_cgs_create_device() fails, release hwmgr and return -ENOMEM to prevent null pointer dereference. [v1]->[v2]: Change error code from -EINVAL to -ENOMEM. Free hwmgr.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/pm/powerplay/amd_powerplay.c
Default Status
unaffected
Versions
Affected
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before 55ef52c30c3e747f145a64de96192e37a8fed670 (git)
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before f8693e1bae9c08233a2f535c3f412e157df32b33 (git)
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before dc4380f34613eaae997b3ed263bd1cb3d0fd0075 (git)
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before 22ea19cc089013b55c240134dbb2797700ff5a6a (git)
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before b784734811438f11533e2fb9e0deb327844bdb56 (git)
  • From b905090d2bae2e6189511714a7b88691b439c5a1 before 1435e895d4fc967d64e9f5bf81e992ac32f5ac76 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/pm/powerplay/amd_powerplay.c
Default Status
affected
Versions
Affected
  • 4.17
Unaffected
  • From 0 before 4.17 (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.24 through 6.12.* (semver)
  • From 6.13.12 through 6.13.* (semver)
  • From 6.14.3 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/55ef52c30c3e747f145a64de96192e37a8fed670
N/A
https://git.kernel.org/stable/c/f8693e1bae9c08233a2f535c3f412e157df32b33
N/A
https://git.kernel.org/stable/c/dc4380f34613eaae997b3ed263bd1cb3d0fd0075
N/A
https://git.kernel.org/stable/c/22ea19cc089013b55c240134dbb2797700ff5a6a
N/A
https://git.kernel.org/stable/c/b784734811438f11533e2fb9e0deb327844bdb56
N/A
https://git.kernel.org/stable/c/1435e895d4fc967d64e9f5bf81e992ac32f5ac76
N/A
Hyperlink: https://git.kernel.org/stable/c/55ef52c30c3e747f145a64de96192e37a8fed670
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f8693e1bae9c08233a2f535c3f412e157df32b33
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dc4380f34613eaae997b3ed263bd1cb3d0fd0075
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/22ea19cc089013b55c240134dbb2797700ff5a6a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b784734811438f11533e2fb9e0deb327844bdb56
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1435e895d4fc967d64e9f5bf81e992ac32f5ac76
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Details not found