CVE-2025-39741
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/xe/migrate component involves an overflow of the maximum copy size during non-page aligned memory copy operations. Specifically, when copying data with a 4-byte aligned pitch, the size of the copy can approach the maximum limit (~8M), causing the dimensions of the copy to exceed the S16_MAX limit of the copy command. This leads to an assertion failure in the kernel, which can cause system instability or crashes. The fix involves properly accounting for the pitch when calculating the number of bytes to copy to prevent this overflow.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to hit an assertion failure during certain GPU memory copy operations, potentially leading to system crashes or instability. This could disrupt normal system operation, cause loss of data in memory operations, or affect applications relying on GPU functionality.