Skip to main content

CVE-2025-21644: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21644cvecve-2025-21644
Published: Sun Jan 19 2025 (01/19/2025, 10:18:00 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb_invalidation_init() to be done earlier: as its own doc says, it's a software-only initialization and should had been named with the _early() suffix. Move it to be called by xe_gt_init_early(), so the locks and seqno are initialized, avoiding a NULL ptr deref when wedging: xe 0000:03:00.0: [drm] *ERROR* GT0: load failed: status: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01 xe 0000:03:00.0: [drm] *ERROR* GT0: firmware signature verification failed xe 0000:03:00.0: [drm] *ERROR* CRITICAL: Xe has declared device 0000:03:00.0 as wedged. ... BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 9 UID: 0 PID: 3908 Comm: modprobe Tainted: G U W 6.13.0-rc4-xe+ #3 Tainted: [U]=USER, [W]=WARN Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 07/01/2022 RIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe] This can be easily triggered by poking the GuC binary to force a signature failure. There will still be an extra message, xe 0000:03:00.0: [drm] *ERROR* GT0: GuC mmio request 0x4100: no reply 0x4100 but that's better than a NULL ptr deref. (cherry picked from commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)

AI-Powered Analysis

AILast updated: 06/30/2025, 16:25:54 UTC

Technical Analysis

CVE-2025-21644 is a vulnerability identified in the Linux kernel specifically affecting the Direct Rendering Manager (DRM) driver for Intel's Xe graphics architecture (referred to as 'xe'). The issue arises during the handling of GuC firmware loading failures. GuC is a microcontroller firmware responsible for GPU scheduling and power management on Intel GPUs. When the GuC firmware fails to load, the driver attempts to 'wedge' the device, a state indicating the GPU is non-functional. However, during this wedging process, the driver previously performed operations before certain internal structures were initialized, leading to a NULL pointer dereference in the kernel. This results in a kernel oops (crash) due to a supervisor read access violation at address zero. The root cause was that the function xe_gt_tlb_invalidation_init(), responsible for initializing translation lookaside buffer (TLB) invalidation mechanisms, was called too late, after the driver tried to access uninitialized locks and sequence numbers. The fix involved moving this initialization earlier in the xe_gt_init_early() function, ensuring proper setup before any wedging attempts. The vulnerability can be triggered by tampering with the GuC binary to force a signature verification failure, causing the driver to enter the wedged state and crash. While this does not appear to allow arbitrary code execution, the kernel crash can lead to denial of service (DoS) conditions on affected systems. The vulnerability affects Linux kernel versions containing the specified commit hash and is related to Intel Alder Lake platforms using the Xe GPU architecture. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2025-21644 is the potential for denial of service on systems running vulnerable Linux kernels with Intel Xe GPUs, particularly Alder Lake platforms. This could affect servers, workstations, or embedded devices relying on these GPUs for graphics or compute workloads. A kernel crash can disrupt critical services, cause system instability, and require manual intervention or reboot, impacting availability. Organizations using Linux-based infrastructure in sectors such as finance, manufacturing, research, or government could face operational interruptions. Although the vulnerability does not directly expose data confidentiality or integrity risks, repeated or targeted exploitation could degrade system reliability. Given the widespread use of Linux in European data centers and enterprises, especially in countries with strong technology sectors, the vulnerability poses a moderate operational risk. The lack of known exploits reduces immediate threat levels, but the ease of triggering the issue by manipulating GuC firmware suggests potential for exploitation in hostile environments or by insiders.

Mitigation Recommendations

To mitigate CVE-2025-21644, European organizations should: 1) Apply the latest Linux kernel updates that include the patch moving the xe_gt_tlb_invalidation_init() call earlier in the initialization sequence. This is the definitive fix preventing the NULL pointer dereference. 2) Restrict access to firmware binaries and ensure integrity checks on GuC firmware to prevent tampering that could trigger the vulnerability. 3) Monitor kernel logs for error messages related to GuC firmware loading failures or device wedging to detect potential exploitation attempts. 4) For critical systems, consider disabling or limiting the use of affected Intel Xe GPUs if kernel updates cannot be applied promptly. 5) Employ kernel crash recovery mechanisms and automated reboot strategies to minimize downtime in case of crashes. 6) Engage with hardware vendors and Linux distribution maintainers to confirm the presence of patches in vendor kernels and backports for long-term support releases. 7) Conduct vulnerability scanning and penetration testing focusing on GPU driver stability and firmware validation to identify exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.727Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9724

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 4:25:54 PM

Last updated: 7/29/2025, 2:33:36 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats