-
CVE-2025-38521
- EPSS 0.02%
- Veröffentlicht 16.08.2025 10:55:08
- Zuletzt bearbeitet 18.08.2025 20:16:28
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Fix kernel crash when hard resetting the GPU The GPU hard reset sequence calls pm_runtime_force_suspend() and pm_runtime_force_resume(), which according to their documentation should only be used during system-wide PM transitions to sleep states. The main issue though is that depending on some internal runtime PM state as seen by pm_runtime_force_suspend() (whether the usage count is <= 1), pm_runtime_force_resume() might not resume the device unless needed. If that happens, the runtime PM resume callback pvr_power_device_resume() is not called, the GPU clocks are not re-enabled, and the kernel crashes on the next attempt to access GPU registers as part of the power-on sequence. Replace calls to pm_runtime_force_suspend() and pm_runtime_force_resume() with direct calls to the driver's runtime PM callbacks, pvr_power_device_suspend() and pvr_power_device_resume(), to ensure clocks are re-enabled and avoid the kernel crash.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9f852d301f642223c4798f3c13ba15e91165d078
Version
cc1aeedb98ad347c06ff59e991b2f94dfb4c565d
Status
affected
Version <
e066cc6e0f094ca2120f1928d126d56f686cd73e
Version
cc1aeedb98ad347c06ff59e991b2f94dfb4c565d
Status
affected
Version <
d38376b3ee48d073c64e75e150510d7e6b4b04f7
Version
cc1aeedb98ad347c06ff59e991b2f94dfb4c565d
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.8
Status
affected
Version <
6.8
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.39
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.048 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|