CVE-2025-71301
Race Condition in Linux Kernel DRM GEM SHMEM Helper
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the drm/tests subsystem, specifically the shmem (shared memory) component. The issue was that the reservation lock for GEM objects was not properly held around the vmap and vunmap operations. This improper locking led to errors and warnings during execution, as the tests used a function called vmap_locked incorrectly. The fix involved acquiring and releasing the GEM object's reservation lock properly around these operations to prevent such errors.
How can this vulnerability impact me? :
The vulnerability can cause errors and warnings in the GPU DRM subsystem of the Linux kernel, potentially leading to instability or unexpected behavior during graphics memory management operations. Since the issue involves improper locking around memory mapping functions, it could result in race conditions or data corruption in the graphics memory handling, affecting system reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific warning messages related to the drm_gem_shmem_helper functions in the Linux kernel.
- Check the kernel log for warnings such as:
- [ 122.292030] WARNING: CPU: 3 PID: 1413 at drivers/gpu/drm/drm_gem_shmem_helper.c:390 drm_gem_shmem_vmap_locked+0x3a3/0x6f0
- [ 122.468066] WARNING: CPU: 3 PID: 1413 at drivers/gpu/drm/drm_gem_shmem_helper.c:293 drm_gem_shmem_pin_locked+0x1fe/0x350
- [ 122.563504] WARNING: CPU: 3 PID: 1413 at drivers/gpu/drm/drm_gem_shmem_helper.c:234 drm_gem_shmem_get_pages_locked+0x23c/0x370
- [ 122.662248] WARNING: CPU: 2 PID: 1413 at drivers/gpu/drm/drm_gem_shmem_helper.c:452 drm_gem_shmem_vunmap_locked+0x101/0x330
You can use the following command to check for these warnings in the kernel log:
- dmesg | grep drm_gem_shmem_helper
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the issue has been resolved.
The fix involves acquiring and releasing the GEM object's reservation lock around vmap and vunmap operations, which prevents the errors described.
Avoid using the vmap/vunmap helpers outside of Kunit tests, as the new helpers are only exported for testing purposes and not intended for regular drivers.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information about CVE-2025-71301 does not include any details regarding its impact on compliance with common standards and regulations such as GDPR or HIPAA.