CVE-2025-38355
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/xe component involves improper handling of deferred GGTT node removals during device unwinding. Specifically, asynchronous removal of some GGTT nodes uses a dedicated workqueue that may not be properly drained before the MMIO/GMS mappings are unmapped during device shutdown. This can lead to a race condition causing a kernel page fault and system crash during device initialization or removal.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes (oops) due to page faults when the system tries to access unmapped memory during device removal or initialization. This can lead to system instability, failed device initialization, and potential denial of service on affected systems using the drm/xe driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific error messages related to the drm/xe driver, such as failed VF initialization errors and workqueue processing issues. Look for log entries similar to: - xe 0000:00:02.1: probe with driver xe failed with error -62 - DEVRES REL messages related to __xe_bo_unpin_map_no_vm, tiles_fini, mmio_fini, xe_bo_pinned_fini, devm_drm_dev_init_release - drm_managed_release related REL messages - BUG: unable to handle page fault for address - #PF: supervisor write access in kernel mode - Workqueue: xe-ggtt-wq ggtt_node_remove_work_func [xe] Commands to check kernel logs: - sudo dmesg | grep xe - sudo journalctl -k | grep xe - sudo dmesg | grep -E 'BUG|Oops|Workqueue|drm_managed_release' These commands help identify the presence of the described error patterns indicating the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix which adds a managed-device action explicitly draining the workqueue with all pending node removals prior to releasing MMIO/GSM mapping. This prevents the race condition causing the page fault and driver failure. Until the update is applied, monitoring for the error messages and avoiding workloads that trigger VF initialization on the xe driver may reduce exposure.