Impact
In the Linux kernel AMDGPU driver, a race exists when two processes share a drm_file and concurrently acquire the same virtual memory object after a fork, causing the vm->process_info field to be freed and then accessed. This use‑after‑free can lead to kernel memory corruption and potentially a denial of service or other security impact, though the CVE description does not document a specific exploit outcome.
Affected Systems
The flaw affects the DRM subsystem of the Linux kernel, specifically the AMDGPU driver, in any kernel version lacking the commit c7c573275ec20db05be769288a3e3bb2250ec618 or later. Any system running such kernels remains vulnerable.
Risk and Exploitability
No CVSS or EPSS metrics are provided and the vulnerability is not listed in CISA KEV. The attack vector appears to be local: an attacker must be able to spawn relevant processes that share a DRM file to trigger the race during VM acquisition. Because no exploitation evidence is reported, the risk is uncertain, but potential kernel corruption could cause system instability or other security impacts.
OpenCVE Enrichment