CVE-2025-38354
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.18.18 (inc) to 5.19 (exc) |
| linux | linux_kernel | From 5.19.2 (inc) to 6.1.143 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.96 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.36 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.5 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a crash in the Linux kernel's GPU driver (drm/msm) that occurs when the GPU is hot during boot and the system tries to apply devfreq cooling immediately. The crash happens because the GPU Management Unit (GMU) registers are accessed before they are initialized, due to a mismatch in the suspended state flag during initialization. This causes a kernel paging fault and crash.
How can this vulnerability impact me? :
This vulnerability can cause the system to crash during boot if the GPU is hot, leading to instability or failure to start properly. This could affect device reliability and availability until the issue is fixed.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the issue by correctly setting the df->suspended flag during initialization in the msm_devfreq_init() function to prevent the GPU crash during boot. This patch is referenced in the Patchwork link: https://patchwork.freedesktop.org/patch/650772/. Until the patch is applied, avoid scenarios where the GPU is hot immediately during boot to prevent triggering the crash.