CVE-2025-38189
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel Oops messages related to NULL pointer dereferences in the v3d driver, specifically messages mentioning 'v3d_job_update_stats'. You can check the kernel log using commands like 'dmesg | grep v3d' or 'journalctl -k | grep v3d' to look for such errors.
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's drm/v3d driver, specifically in the function v3d_job_update_stats(). It occurs when a file descriptor is closed before the GPU jobs submitted by it are completed. When the job finishes, the kernel tries to update GPU statistics related to that file descriptor, but since the file descriptor's associated data structure has already been freed, this leads to a NULL pointer dereference and a kernel crash (Oops). The fix avoids updating per-file descriptor stats if the file descriptor was already closed.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel Oops) leading to system instability or denial of service. Specifically, it can cause the system to panic and stop functioning properly when the GPU driver attempts to update stats for a closed file descriptor. This can disrupt normal operation, potentially requiring a reboot or causing loss of unsaved data.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as it is caused by a NULL pointer dereference in the v3d driver. Avoid closing file descriptors related to GPU jobs before their completion to prevent triggering the issue. Applying the vendor's patch or kernel update that addresses this issue is recommended.