Impact
In the Linux kernel’s Direct Rendering Manager module for AMD KFD, when a queue update fails, the error handling path fails to unreserve the associated buffer object. This leaves the buffer reserved, potentially accumulating unclaimed resources and leading to kernel resource exhaustion or a crash if the stale reference is later accessed. The flaw does not provide a direct path to execute arbitrary code, but it can compromise system stability and availability.
Affected Systems
All deployments of the Linux kernel that have not incorporated commit c24afed7de9ecce341825d8ab55a43a254348b33 in the drm/amdkfd module, which includes every kernel version before that patch across all Linux distributions.
Risk and Exploitability
The CVSS score is not disclosed and the EPSS score of less than 1% (0.00018) indicates a low exploitation likelihood. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker would need local or privileged kernel access to trigger the failing queue update path. The risk is primarily a denial‑of‑service scenario that could lead to system instability, memory exhaustion, or kernel reboot.
OpenCVE Enrichment