We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38064

virtio: break and reset virtio devices on device_shutdown()



Description

In the Linux kernel, the following vulnerability has been resolved: virtio: break and reset virtio devices on device_shutdown() Hongyu reported a hang on kexec in a VM. QEMU reported invalid memory accesses during the hang. Invalid read at addr 0x102877002, size 2, region '(null)', reason: rejected Invalid write at addr 0x102877A44, size 2, region '(null)', reason: rejected ... It was traced down to virtio-console. Kexec works fine if virtio-console is not in use. The issue is that virtio-console continues to write to the MMIO even after underlying virtio-pci device is reset. Additionally, Eric noticed that IOMMUs are reset before devices, if devices are not reset on shutdown they continue to poke at guest memory and get errors from the IOMMU. Some devices get wedged then. The problem can be solved by breaking all virtio devices on virtio bus shutdown, then resetting them.

Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before aee42f3d57bfa37b2716df4584edeecf63b9df4c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8bd2fa086a04886798b505f28db4002525895203
affected

Default status
affected

6.14.9
unaffected

6.15
unaffected

References

git.kernel.org/...c/aee42f3d57bfa37b2716df4584edeecf63b9df4c

git.kernel.org/...c/8bd2fa086a04886798b505f28db4002525895203

cve.org (CVE-2025-38064)

nvd.nist.gov (CVE-2025-38064)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38064

Support options

Helpdesk Chat, Email, Knowledgebase