Skip to main content

CVE-2025-23162: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-23162cvecve-2025-23162
Published: Thu May 01 2025 (05/01/2025, 12:55:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/vf: Don't try to trigger a full GT reset if VF VFs don't have access to the GDRST(0x941c) register that driver uses to reset a GT. Attempt to trigger a reset using debugfs: $ cat /sys/kernel/debug/dri/0000:00:02.1/gt0/force_reset or due to a hang condition detected by the driver leads to: [ ] xe 0000:00:02.1: [drm] GT0: trying reset from force_reset [xe] [ ] xe 0000:00:02.1: [drm] GT0: reset queued [ ] xe 0000:00:02.1: [drm] GT0: reset started [ ] ------------[ cut here ]------------ [ ] xe 0000:00:02.1: [drm] GT0: VF is trying to write 0x1 to an inaccessible register 0x941c+0x0 [ ] WARNING: CPU: 3 PID: 3069 at drivers/gpu/drm/xe/xe_gt_sriov_vf.c:996 xe_gt_sriov_vf_write32+0xc6/0x580 [xe] [ ] RIP: 0010:xe_gt_sriov_vf_write32+0xc6/0x580 [xe] [ ] Call Trace: [ ] <TASK> [ ] ? show_regs+0x6c/0x80 [ ] ? __warn+0x93/0x1c0 [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe] [ ] ? report_bug+0x182/0x1b0 [ ] ? handle_bug+0x6e/0xb0 [ ] ? exc_invalid_op+0x18/0x80 [ ] ? asm_exc_invalid_op+0x1b/0x20 [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe] [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe] [ ] ? xe_gt_tlb_invalidation_reset+0xef/0x110 [xe] [ ] ? __mutex_unlock_slowpath+0x41/0x2e0 [ ] xe_mmio_write32+0x64/0x150 [xe] [ ] do_gt_reset+0x2f/0xa0 [xe] [ ] gt_reset_worker+0x14e/0x1e0 [xe] [ ] process_one_work+0x21c/0x740 [ ] worker_thread+0x1db/0x3c0 Fix that by sending H2G VF_RESET(0x5507) action instead.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:25:18 UTC

Technical Analysis

CVE-2025-23162 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the Intel Xe graphics driver (xe) handling of virtual functions (VFs) in a Single Root I/O Virtualization (SR-IOV) environment. The vulnerability arises because VFs, which are lightweight virtualized instances of a physical GPU, do not have access to the GDRST register (0x941c) used by the driver to perform a full Graphics Technology (GT) reset. When a VF attempts to trigger a full GT reset—either manually via debugfs by writing to /sys/kernel/debug/dri/0000:00:02.1/gt0/force_reset or automatically due to a detected hang condition—the driver tries to write to this inaccessible register. This results in an invalid operation warning and a kernel warning/error, as the VF is not permitted to write to this register. The root cause is improper handling of reset requests from VFs, which leads to attempts to perform unauthorized register writes, causing kernel warnings and potentially destabilizing the system. The fix implemented involves changing the reset mechanism for VFs to send a Host-to-GPU (H2G) VF_RESET action (0x5507) instead of attempting a direct register write, thereby preventing the invalid access and associated kernel warnings or crashes. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant for systems using Intel Xe graphics with SR-IOV enabled, particularly where VFs are utilized. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2025-23162 depends largely on their deployment of Linux systems with Intel Xe graphics hardware configured with SR-IOV and virtual functions enabled. The vulnerability can lead to kernel warnings and potentially system instability or crashes when a VF attempts to trigger a GT reset improperly. This could affect the availability of GPU-accelerated workloads, particularly in virtualized environments such as cloud infrastructure, data centers, or high-performance computing clusters that rely on GPU virtualization for multi-tenant usage. Disruptions could impact critical services that depend on GPU processing, including AI/ML workloads, graphics rendering, or scientific computations. Although the vulnerability does not appear to allow privilege escalation or direct code execution, the resulting kernel warnings and potential crashes could cause denial of service conditions. For organizations using these configurations, this could translate into downtime, degraded performance, or increased operational costs due to troubleshooting and remediation efforts. Given the lack of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or malicious triggering of the issue.

Mitigation Recommendations

To mitigate CVE-2025-23162, European organizations should: 1) Apply the Linux kernel patch that implements the fix by replacing direct register writes with the H2G VF_RESET action for VFs. This requires updating to a kernel version that includes the fix or backporting the patch if using long-term support kernels. 2) Audit and monitor systems using Intel Xe GPUs with SR-IOV enabled to identify virtual functions that might trigger GT resets. 3) Restrict access to debugfs interfaces such as /sys/kernel/debug/dri/*/gt0/force_reset to trusted administrators only, minimizing the risk of accidental or unauthorized reset attempts. 4) Implement robust monitoring and alerting for kernel warnings related to DRM and GPU resets to detect attempts to exploit or inadvertently trigger the vulnerability. 5) For environments where GPU virtualization is not required, consider disabling SR-IOV or VF functionality to reduce the attack surface. 6) Coordinate with hardware and software vendors to ensure compatibility and timely updates for GPU drivers and kernel modules. These steps go beyond generic advice by focusing on the specific driver and virtualization features involved in this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-11T14:28:41.515Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd849a

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/3/2025, 10:25:18 PM

Last updated: 8/12/2025, 11:54:18 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats