CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown()

Description

In the Linux kernel, the following vulnerability has been resolved:

virtio: break and reset virtio devices on device_shutdown()

Hongyu reported a hang on kexec in a VM. QEMU reported invalid memory
accesses during the hang.

Invalid read at addr 0x102877002, size 2, region '(null)', reason: rejected
Invalid write at addr 0x102877A44, size 2, region '(null)', reason: rejected
...

It was traced down to virtio-console. Kexec works fine if virtio-console
is not in use.

The issue is that virtio-console continues to write to the MMIO even after
underlying virtio-pci device is reset.

Additionally, Eric noticed that IOMMUs are reset before devices, if
devices are not reset on shutdown they continue to poke at guest memory
and get errors from the IOMMU. Some devices get wedged then.

The problem can be solved by breaking all virtio devices on virtio
bus shutdown, then resetting them.

Classification

CVE ID: CVE-2025-38064

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 4.91% (scored less or equal to compared to others)

EPSS Date: 2025-06-24 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-38064
https://git.kernel.org/stable/c/aee42f3d57bfa37b2716df4584edeecf63b9df4c
https://git.kernel.org/stable/c/8bd2fa086a04886798b505f28db4002525895203

Timeline