| Name | CVE-2025-38011 | 
| Description | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: csa unmap use uninterruptible lock  After process exit to unmap csa and free GPU vm, if signal is accepted and then waiting to take vm lock is interrupted and return, it causes memory leaking and below warning backtrace.  Change to use uninterruptible wait lock fix the issue.  WARNING: CPU: 69 PID: 167800 at amd/amdgpu/amdgpu_kms.c:1525  amdgpu_driver_postclose_kms+0x294/0x2a0 [amdgpu]  Call Trace:   <TASK>   drm_file_free.part.0+0x1da/0x230 [drm]   drm_close_helper.isra.0+0x65/0x70 [drm]   drm_release+0x6a/0x120 [drm]   amdgpu_drm_release+0x51/0x60 [amdgpu]   __fput+0x9f/0x280   ____fput+0xe/0x20   task_work_run+0x67/0xa0   do_exit+0x217/0x3c0   do_group_exit+0x3b/0xb0   get_signal+0x14a/0x8d0   arch_do_signal_or_restart+0xde/0x100   exit_to_user_mode_loop+0xc1/0x1a0   exit_to_user_mode_prepare+0xf4/0x100   syscall_exit_to_user_mode+0x17/0x40   do_syscall_64+0x69/0xc0  (cherry picked from commit 7dbbfb3c171a6f63b01165958629c9c26abf38ab) | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
The table below lists information on source packages.
The information below is based on the following data on fixed versions.