{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T18:52:17.448","vulnerabilities":[{"cve":{"id":"CVE-2025-38036","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-06-18T10:15:35.897","lastModified":"2025-11-14T17:08:38.437","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/vf: Perform early GT MMIO initialization to read GMDID\n\nVFs need to communicate with the GuC to obtain the GMDID value\nand existing GuC functions used for that assume that the GT has\nit's MMIO members already setup. However, due to recent refactoring\nthe gt->mmio is initialized later, and any attempt by the VF to use\nxe_mmio_read|write() from GuC functions will lead to NPD crash due\nto unset MMIO register address:\n\n[] xe 0000:00:02.1: [drm] Running in SR-IOV VF mode\n[] xe 0000:00:02.1: [drm] GT0: sending H2G MMIO 0x5507\n[] BUG: unable to handle page fault for address: 0000000000190240\n\nSince we are already tweaking the id and type of the primary GT to\nmimic it's a Media GT before initializing the GuC communication,\nwe can also call xe_gt_mmio_init() to perform early setup of the\ngt->mmio which will make those GuC functions work again."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/vf: Realizar una inicialización temprana de MMIO de GT para leer GMDID. Los VF deben comunicarse con el GuC para obtener el valor GMDID y las funciones GuC existentes utilizadas para eso suponen que el GT ya tiene configurados sus miembros MMIO. Sin embargo, debido a una refactorización reciente, gt-&gt;mmio se inicializa más tarde y cualquier intento del VF de usar xe_mmio_read|write() desde las funciones GuC provocará un bloqueo de NPD debido a una dirección de registro MMIO no establecida: [] xe 0000:00:02.1: [drm] Ejecutando en modo SR-IOV VF [] xe 0000:00:02.1: [drm] GT0: enviando H2G MMIO 0x5507 [] ERROR: no se puede manejar el error de página para la dirección: 0000000000190240 Dado que ya estamos ajustando el id y el tipo del GT principal para imitar que es un Media GT antes de inicializar la comunicación GuC, también podemos llamar a xe_gt_mmio_init() para realizar una configuración temprana de gt-&gt;mmio que hará que esas funciones GuC funcionen nuevamente."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.14.9","matchCriteriaId":"B4A8109C-7EEC-41C4-A552-73A6F2581578"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/13265fe7426ec9ba5aa86baab913417ca361e8a4","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/ef6e950aea76a5009ccc79ebfa955ecc66cd85a2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}