CVE-2025-38188
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/07/2025
Última modificación:
04/07/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE<br />
<br />
Calling this packet is necessary when we switch contexts because there<br />
are various pieces of state used by userspace to synchronize between BR<br />
and BV that are persistent across submits and we need to make sure that<br />
they are in a "safe" state when switching contexts. Otherwise a<br />
userspace submission in one context could cause another context to<br />
function incorrectly and hang, effectively a denial of service (although<br />
without leaking data). This was missed during initial a7xx bringup.<br />
<br />
Patchwork: https://patchwork.freedesktop.org/patch/654924/