0.0
NA
CVE-2025-40340
Xe Linux DRM Oops in Gem Fault
Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test. I saw an oops in xe_gem_fault when running the xe-fast-feedback testlist against the realtime kernel without debug options enabled. The panic happens after core_hotunplug unbind-rebind finishes. Presumably what happens is that a process mmaps, unlocks because of the FAULT_FLAG_RETRY_NOWAIT logic, has no process memory left, causing ttm_bo_vm_dummy_page() to return VM_FAULT_NOPAGE, since there was nothing left to populate, and then oopses in "mem_type_is_vram(tbo->resource->mem_type)" because tbo->resource is NULL. It's convoluted, but fits the data and explains the oops after the test exits.

INFO

Published Date :

Dec. 9, 2025, 6:28 a.m.

Last Modified :

Dec. 9, 2025, 6:28 a.m.

Remotely Exploit :

No

Source :

None
Affected Products

The following products are affected by CVE-2025-40340 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Address a kernel oops in xe_gem_fault related to memory management and resource handling.
  • Update the Linux kernel to the latest stable version.
  • Apply relevant patches for the xe driver.
  • Recompile and install the kernel.
  • Test the fix with core_hotunplug.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-40340.

URL Resource
https://git.kernel.org/stable/c/99428bd6123d5676209dfb1d7a8f176cc830b665
https://git.kernel.org/stable/c/29a3064f9c5a908aaf0b39cd6ed30374db11840d
https://git.kernel.org/stable/c/1cda3c755bb7770be07d75949bb0f45fb88651f6
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-40340 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-40340 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-40340 vulnerability anywhere in the article.

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.