CVE-2025-38690

Source
https://cve.org/CVERecord?id=CVE-2025-38690
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38690.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38690
Downstream
Published
2025-09-04T15:32:44.559Z
Modified
2026-03-09T23:54:05.838813Z
Summary
drm/xe/migrate: prevent infinite recursion
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe/migrate: prevent infinite recursion

If the buf + offset is not aligned to XECAHELINEBYTES we fallback to using a bounce buffer. However the bounce buffer here is allocated on the stack, and the only alignment requirement here is that it's naturally aligned to u8, and not XECACHELINEBYTES. If the bounce buffer is also misaligned we then recurse back into the function again, however the new bounce buffer might also not be aligned, and might never be until we eventually blow through the stack, as we keep recursing.

Instead of using the stack use kmalloc, which should respect the power-of-two alignment request here. Fixes a kernel panic when triggering this path through eudebug.

v2 (Stuart): - Add build bug check for power-of-two restriction - s/EINVAL/ENOMEM/

(cherry picked from commit 38b34e928a08ba594c4bbf7118aa3aadacd62fff)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38690.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
270172f64b114451876c1b68912653e72ab99f38
Fixed
89f511c024879c5812cc0c010a6663b5e49950f3
Fixed
9d7a1cbebbb691891671def57407ba2f8ee914e8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38690.json"