CVE-2025-38389
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.4 (inc) to 5.4.296 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.240 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.187 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.144 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.97 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.37 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.6 (exc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this issue, which ensures that the legacy timeline is only acquired after successful allocation of the context engine's VMA, preventing the timeline from being held on allocation errors. Avoid running the specific IGT tests that trigger this issue if possible until the fix is applied.
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's i915 graphics driver related to the handling of the legacy timeline during ring submission. When certain tests interrupt the driver with signals during VMA (Virtual Memory Area) allocation, the timeline reference is left held if the allocation fails. This causes the timeline and its associated resources not to be properly released when the driver is unbound, potentially leading to resource leaks and instability.
How can this vulnerability impact me? :
The vulnerability can cause resource leaks in the i915 graphics driver, specifically leaving the legacy timeline held and not released on driver unbind. This can lead to instability or unexpected behavior in the graphics subsystem, especially under conditions where the driver is frequently loaded and unloaded or interrupted by signals during execution buffer operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific warning messages related to the i915 driver. Look for messages such as 'drm_WARN_ON(dev_priv->mm.shrink_count)' and traces involving 'i915_gem_cleanup_early' or 'BUG i915_vma (Tainted: G U W N ): Objects remaining on __kmem_cache_shutdown()'. You can use the command 'dmesg | grep i915' or 'journalctl -k | grep i915' to search for these indicators in kernel logs.