VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-40334

CVE-2025-40334

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate userq buffer virtual address and size

It needs to validate the userq object virtual address to determine whether it is residented in a valid vm mapping.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing validation of user queue buffer virtual address in the AMDGPU DRM driver could allow a local attacker to trigger a use-after-free or access invalid memory.

Root

Cause

The vulnerability resides in the drm/amdgpu driver within the Linux kernel. The driver fails to validate the virtual address and size of a user queue (userq) buffer object. Without this validation, the kernel cannot determine whether the buffer is resident in a valid virtual memory mapping [1].

Exploitation

To exploit this flaw, an attacker must have local access to the system and the ability to submit user queue commands to the AMD GPU. By crafting a userq buffer with an invalid virtual address or size, the attacker can cause the kernel to operate on a buffer that is not properly mapped, leading to memory corruption [1].

Impact

Successful exploitation could result in a local attacker could trigger a use-after-free condition or access invalid memory regions. This could result in a system crash (denial of service) or potentially allow privilege escalation if the attacker can control the corrupted memory [1].

Mitigation

The fix was applied in the Linux kernel stable tree via commit 9e46b8bb0539d7bc9a9e7b3072fa4f6082490392. Users should update their kernel to a version containing this commit to include this commit or a backport [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.