Impact
The bug resides in the Linux kernel's DRM/xe driver where the logic that tracks the previous and next virtual memory areas (VMA) during remapping operations is incorrectly reset in certain skip scenarios. This oversight can create stale or overlapping VMA entries, leading to kernel warnings such as vm_bind_ioctl_ops_unwind and a corrupted VM state. Based on the description, it is inferred that the fault could lead to a kernel crash. The weakness manifests as improper memory management, resembling a use‑after‑free or buffer overflow (CWE‑823). Based on the description, it is inferred that such a fault can cause a system crash or abort, resulting in denial of service at the kernel level.
Affected Systems
All Linux kernel releases that include the drm/xe driver are affected. The bug is present in mainline kernels from 6.8 and any 7.0 release candidates up to rc7, as indicated by the CPE list and the reference kernel version 7.0.0-070000rc3-generic shown in the advisory. Any system running one of these kernel versions with the DRM/xe driver enabled is potentially vulnerable until the patch commit aec6969f75a… is applied.
Risk and Exploitability
The CVSS score is 7.8, indicating high severity, while the EPSS score is less than 1%, indicating a low likelihood of recent exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation would require local execution with access to the GPU driver; an unprivileged user on a system allowing 3D workloads could trigger the faulty VMA remap by running a graphics application. If a system runs an unpatched kernel with drm/xe enabled, it is inferred that a local attacker could exploit this defect to crash the system and cause a denial of service. The attack surface appears to be limited to environments where the buggy driver path is exercised.
OpenCVE Enrichment
Debian DSA