CVE-2025-37951
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2025
Last modified:
17/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/v3d: Add job to pending list if the reset was skipped<br />
<br />
When a CL/CSD job times out, we check if the GPU has made any progress<br />
since the last timeout. If so, instead of resetting the hardware, we skip<br />
the reset and let the timer get rearmed. This gives long-running jobs a<br />
chance to complete.<br />
<br />
However, when `timedout_job()` is called, the job in question is removed<br />
from the pending list, which means it won&#39;t be automatically freed through<br />
`free_job()`. Consequently, when we skip the reset and keep the job<br />
running, the job won&#39;t be freed when it finally completes.<br />
<br />
This situation leads to a memory leak, as exposed in [1] and [2].<br />
<br />
Similarly to commit 704d3d60fec4 ("drm/etnaviv: don&#39;t block scheduler when<br />
GPU is still active"), this patch ensures the job is put back on the<br />
pending list when extending the timeout.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.18 (including) | 6.1.139 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.91 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.29 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/12125f7d9c15e6d8ac91d10373b2db2f17dcf767
- https://git.kernel.org/stable/c/35e4079bf1a2570abffce6ababa631afcf8ea0e5
- https://git.kernel.org/stable/c/422a8b10ba42097a704d6909ada2956f880246f2
- https://git.kernel.org/stable/c/5235b56b7e5449d990d21d78723b1a5e7bb5738e
- https://git.kernel.org/stable/c/a5f162727b91e480656da1876247a91f651f76de
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



