CVE-2025-68203Kernel vulnerability

6 documents5 sources
Severity
5.3MEDIUM
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential deadlock caused by inconsistent spinlock usage between interrupt and process contexts in the userq fence driver. The issue occurs when amdgpu_userq_fence_driver_process() is called from both: - Interrupt context: gfx_v11_0_eop_irq() -> amdgpu_userq_fence_driver_process() - Process context: amdgpu_eviction_fence_suspend_worker() -> amdgpu_userq_fenc

🔴Vulnerability Details

3
OSV
CVE-2025-68203: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential2025-12-16
OSV
drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process2025-12-16
GHSA
GHSA-p8f8-3jm7-5jm4: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potentia2025-12-16

📋Vendor Advisories

2
Red Hat
kernel: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process2025-12-16
Microsoft
drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process2025-12-09

🕵️Threat Intelligence

1
Wiz
CVE-2025-68203 Impact, Exploitability, and Mitigation Steps | Wiz