Impact
When the ccs_mode_store function writes through the DRM sysfs interface, it triggers xe_gt_reset, which in turn calls xe_pm_runtime_get_noresume. That helper requires the caller to already hold a runtime power‑management reference, and if it is not present the kernel emits a warning about a missing outer runtime PM protection. The absence of this reference can lead to improper power state transitions for the GPU, potentially causing crashes or unexpected behavior in the graphics subsystem. The weakness is classified as a resource‑management defect.
Affected Systems
Linux kernels 6.19 and all 7.0 release candidates up to rc7 are affected, as the flaw resides in the DRM XE driver code included in those kernel releases. Any host running these kernels and exposing the DRM XE interface is vulnerable until the reference guard is added.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% points to a very low probability of exploitation. The vulnerability is not listed in CISA KEV. The likely attack vector involves a local user with the ability to write to the ccs_mode sysfs file; because that typically requires elevated privileges, the impact is most likely a local privilege escalation or system instability scenario. This inference is drawn from the fact that the ccs_mode entry is writable by privileged users and the problematic function is invoked by that write operation.
OpenCVE Enrichment