CVE-2025-38410

In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix a fence leak in submit error path In error paths, we could unref the submit without calling drm_sched_entity_push_job(), so msm_job_free() will never get called. Since drm_sched_job_cleanup() will NULL out the s_fence, we can use that to detect this case. Patchwork: https://patchwork.freedesktop.org/patch/653584/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:46

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0dc817f852e5f8ec8501d19ef7dcc01affa181d0 - () https://git.kernel.org/stable/c/0dc817f852e5f8ec8501d19ef7dcc01affa181d0 - Patch
References () https://git.kernel.org/stable/c/0eaa495b3d5710e5ba72051d2e01bb28292c625c - () https://git.kernel.org/stable/c/0eaa495b3d5710e5ba72051d2e01bb28292c625c - Patch
References () https://git.kernel.org/stable/c/201eba5c9652a900c0b248070263f9acd3735689 - () https://git.kernel.org/stable/c/201eba5c9652a900c0b248070263f9acd3735689 - Patch
References () https://git.kernel.org/stable/c/5d319f75ccf7f0927425a7545aa1a22b3eedc189 - () https://git.kernel.org/stable/c/5d319f75ccf7f0927425a7545aa1a22b3eedc189 - Patch
References () https://git.kernel.org/stable/c/5deab0fa6cfd0cd7def17598db15ceb84f950584 - () https://git.kernel.org/stable/c/5deab0fa6cfd0cd7def17598db15ceb84f950584 - Patch
References () https://git.kernel.org/stable/c/fe2695b2f63bd77e0e03bc0fc779164115bb4699 - () https://git.kernel.org/stable/c/fe2695b2f63bd77e0e03bc0fc779164115bb4699 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-401

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm: Se corrige una fuga de la valla en la ruta de error de envío. En las rutas de error, podríamos eliminar la referencia del envío sin llamar a drm_sched_entity_push_job(), por lo que msm_job_free() nunca se llamaría. Dado que drm_sched_job_cleanup() anulará la s_fence, podemos usarla para detectar este caso. Patchwork: https://patchwork.freedesktop.org/patch/653584/
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

25 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 14:15

Updated : 2025-12-23 19:46


NVD link : CVE-2025-38410

Mitre link : CVE-2025-38410

CVE.ORG link : CVE-2025-38410


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime