-

CVE-2025-38410

In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix a fence leak in submit error path

In error paths, we could unref the submit without calling
drm_sched_entity_push_job(), so msm_job_free() will never get
called.  Since drm_sched_job_cleanup() will NULL out the
s_fence, we can use that to detect this case.

Patchwork: https://patchwork.freedesktop.org/patch/653584/

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5deab0fa6cfd0cd7def17598db15ceb84f950584
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
Version < 201eba5c9652a900c0b248070263f9acd3735689
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
Version < fe2695b2f63bd77e0e03bc0fc779164115bb4699
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
Version < 0eaa495b3d5710e5ba72051d2e01bb28292c625c
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
Version < 0dc817f852e5f8ec8501d19ef7dcc01affa181d0
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
Version < 5d319f75ccf7f0927425a7545aa1a22b3eedc189
Version 0cf6c71d70d8aa39b8fd0e39c9009602a0e0d300
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.12
Status affected
Version < 3.12
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.187
Status unaffected
Version <= 6.1.*
Version 6.1.144
Status unaffected
Version <= 6.6.*
Version 6.6.97
Status unaffected
Version <= 6.12.*
Version 6.12.37
Status unaffected
Version <= 6.15.*
Version 6.15.6
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string