CVE-2025-40096
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/10/2025
Last modified:
30/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies<br />
<br />
When adding dependencies with drm_sched_job_add_dependency(), that<br />
function consumes the fence reference both on success and failure, so in<br />
the latter case the dma_fence_put() on the error path (xarray failed to<br />
expand) is a double free.<br />
<br />
Interestingly this bug appears to have been present ever since<br />
commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code<br />
back then looked like this:<br />
<br />
drm_sched_job_add_implicit_dependencies():<br />
...<br />
for (i = 0; i
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4c38a63ae12ecc9370a7678077bde2d61aa80e9c
- https://git.kernel.org/stable/c/57239762aa90ad768dac055021f27705dae73344
- https://git.kernel.org/stable/c/5801e65206b065b0b2af032f7f1eef222aa2fd83
- https://git.kernel.org/stable/c/e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11
- https://git.kernel.org/stable/c/fdfb47e85af1e11ec822c82739dde2dd8dff5115



