Description
A race condition in the MxGPU-Virtualization driver’s ioctl path caused by concurrent unsynchronized access to the global variable amdgv_cmd in an unlocked ioctl handler could be exploited by an attacker to trigger a heap-based buffer overflow, potentially resulting in denial-of-service within the vulnerable system context.
Published: 2026-05-15
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition exists in the MxGPU‑Virtualization driver’s ioctl path when multiple processes access the global variable amdgv_cmd concurrently without proper synchronization. This unsynchronized access can trigger a heap‑based buffer overflow, which an attacker could exploit to cause a denial of service in the context of the vulnerable system. The vulnerability is classed as CWE‑367, a race condition. The potential impact is localized to the system running the driver and can lead to kernel crashes or device failure.

Affected Systems

AMD Instinct MI210, AMD Instinct MI250, AMD Instinct MI300A, AMD Instinct MI300X, AMD Instinct MI308X, AMD Instinct MI325X, AMD Radeon PRO V620, and AMD Radeon PRO V710 are all affected by this flaw. Specific firmware or driver revision numbers are not listed in the provided data.

Risk and Exploitability

With a CVSS score of 2, the severity level is low. The EPSS score is not available and the vulnerability does not appear in the CISA KEV catalog, indicating a low likelihood of widespread exploitation. Attackers would need to obtain access to send malicious ioctl requests to the driver, implying a local or privileged attacker perspective unless the virtualized environment exposes the device to untrusted guests.

Generated by OpenCVE AI on May 15, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If AMD releases an updated driver or firmware that addresses the race condition, install that update as soon as possible.
  • Until a patch is available, restrict access to the GPU device and its virtualization interface to trusted users and processes only, preventing unprivileged or guest machines from issuing ioctl calls.
  • Consider disabling or removing the MxGPU‑Virtualization feature if it is not required for your workload to eliminate the attack surface.

Generated by OpenCVE AI on May 15, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro V620
Amd radeon Pro V710
Vendors & Products Amd
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro V620
Amd radeon Pro V710

Fri, 15 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title Race Condition in AMD Instinct GPU Virtualization Driver Causes Heap‑Based Buffer Overflow and Denial of Service

Fri, 15 May 2026 04:30:00 +0000

Type Values Removed Values Added
Description A race condition in the MxGPU-Virtualization driver’s ioctl path caused by concurrent unsynchronized access to the global variable amdgv_cmd in an unlocked ioctl handler could be exploited by an attacker to trigger a heap-based buffer overflow, potentially resulting in denial-of-service within the vulnerable system context.
Weaknesses CWE-367
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Amd Instinct Mi210 Instinct Mi250 Instinct Mi300a Instinct Mi300x Instinct Mi308x Instinct Mi325x Radeon Pro V620 Radeon Pro V710
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T11:13:19.425Z

Reserved: 2025-06-17T16:53:10.412Z

Link: CVE-2025-52532

cve-icon Vulnrichment

Updated: 2026-05-15T11:13:14.598Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T05:16:32.890

Modified: 2026-05-15T14:10:17.083

Link: CVE-2025-52532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:15:25Z

Weaknesses