CVE-2025-38091
BaseFortify
Publication date: 2025-07-02
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's AMD GPU driver, specifically in the drm/amd/display component. It involves a false positive warning caused by incorrect checks when querying the plane_id in the DML21 wrapper. This issue triggers a warning during a mode1 reset operation, which is a GPU recovery process. The vulnerability was fixed by adding the correct checks to prevent this false warning.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to system stability and debugging. The false positive warning could cause confusion or misinterpretation of GPU recovery status during mode1 reset operations. However, there is no indication that this vulnerability leads to security breaches or system compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing the kernel warning messages related to the amdgpu driver, specifically warnings about false positives when querying plane_id in DML21. You can check for such warnings by running the command: cat /sys/kernel/debug/dri/1/amdgpu_gpu_recover and looking for messages similar to the provided kernel warning logs.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by a patch that fixes the false positive warning in the amdgpu driver. Immediate mitigation involves updating the Linux kernel to a version that includes this fix (post commit f8ad62c0a93e5dd94243e10f1b742232e4d6411e). Until then, monitoring for the warning messages can help identify the issue.