Impact
An issue in the Linux kernel’s DRM shmem tests causes the GEM object’s reservation lock to be released while the madvise operation is in progress, leading to a race condition that triggers kernel warning messages and can potentially corrupt kernel state or cause a crash. The flaw is confined to the test helper function and does not affect normal driver operation.
Affected Systems
The vulnerability exists in the Linux kernel’s DRM shmem module. All builds that include the unpatched test helper function are affected; this includes development or test environments that compile the original drm_gem_shmem_madvise_locked function. Production configurations that omit these test helpers are unlikely to be impacted.
Risk and Exploitability
The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, indicating that known exploitation is not currently documented. Because the flaw resides in a testing helper function rather than a publicly exposed interface, the practical attack surface is limited. However, a privileged user who can trigger the test code could potentially induce kernel instability. The CVSS score is not supplied, so the severity remains uncertain but is considered low to moderate under the given constraints.
OpenCVE Enrichment