vulnerability
Ubuntu: (Multiple Advisories) (CVE-2025-21939): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Apr 1, 2025 | Jun 26, 2025 | Nov 4, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/hmm: Don't dereference struct page pointers without notifier lock
The pnfs that we obtain from hmm_range_fault() point to pages that
we don't have a reference on, and the guarantee that they are still
in the cpu page-tables is that the notifier lock must be held and the
notifier seqno is still valid.
So while building the sg table and marking the pages accesses / dirty
we need to hold this lock with a validated seqno.
However, the lock is reclaim tainted which makes
sg_alloc_table_from_pages_segment() unusable, since it internally
allocates memory.
Instead build the sg-table manually. For the non-iommu case
this might lead to fewer coalesces, but if that's a problem it can
be fixed up later in the resource cursor code. For the iommu case,
the whole sg-table may still be coalesced to a single contigous
device va region.
This avoids marking pages that we don't own dirty and accessed, and
it also avoid dereferencing struct pages that we don't own.
v2:
- Use assert to check whether hmm pfns are valid (Matthew Auld)
- Take into account that large pages may cross range boundaries
(Matthew Auld)
v3:
- Don't unnecessarily check for a non-freed sg-table. (Matthew Auld)
- Add a missing up_read() in an error path. (Matthew Auld)
(cherry picked from commit ea3e66d280ce2576664a862693d1da8fd324c317)
Solutions
References
- CVE-2025-21939
- https://attackerkb.com/topics/CVE-2025-21939
- CWE-476
- UBUNTU-USN-7605-1
- UBUNTU-USN-7605-2
- UBUNTU-USN-7606-1
- UBUNTU-USN-7628-1
- URL-https://git.kernel.org/linus/0a98219bcc961edd3388960576e4353e123b4a51
- URL-https://ubuntu.com/security/notices/USN-7605-1
- URL-https://ubuntu.com/security/notices/USN-7606-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-21939
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.