Impact
A bug in the Linux kernel’s DRM tests triggered a warning by calling the thread‑unsafe purge operation without holding the reservation lock. The failure caused warning messages during test execution but does not expose any functionality to ordinary drivers or end users. The vulnerability was mitigated by replacing the test helper with a new function that correctly handles lock acquisition.
Affected Systems
The issue affects the Linux kernel’s DRM subsystem test suite, specifically those drivers that employ the old shmem purge helper. Only development or continuous‑integration environments that run Kunit tests are directly impacted; normal production kernels remain unaffected.
Risk and Exploitability
The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, indicating a very low likelihood of exploitation. Because the flaw only manifests in the test framework and requires privileged kernel modification to trigger, the overall risk to typical users is negligible. No known attack path exists for surface‑level exploitation.
OpenCVE Enrichment