Impact
The Linux kernel’s accel/ivpu subsystem had a flaw that allowed callers to re‑export imported GEM buffers. Because the kernel did not reject this operation, the original buffer flag settings were lost, which caused the device to treat subsequent accesses to the buffer incorrectly and could lead to data corruption or improper permissions for the device traffic. The bug was addressed by adding a custom prime_handle_to_fd callback that checks whether the object was imported and returns -EOPNOTSUPP if it was, thereby preventing the re‑export.
Affected Systems
Affected systems: Any Linux kernel that includes the accel/ivpu driver and GEM buffer handling logic is potentially impacted. The NAO vendors list indicates Linux:Linux, and no specific version ranges are provided, meaning that any kernel built with this subsystem before the patch is affected.
Risk and Exploitability
EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog, so the exploitation probability cannot be quantified. The bug involves low‑level kernel buffer management, so exploitation would require interaction with the graphics or accelerated video subsystem, suggesting a local or privileged attack surface. While no CVSS score is supplied, the nature of the flaw indicates potential for data corruption and, by extension, possible privilege escalation, warranting a precautionary stance.
OpenCVE Enrichment