CVE-2025-37951

Source
https://cve.org/CVERecord?id=CVE-2025-37951
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37951.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37951
Downstream
Related
Published
2025-05-20T16:01:46.555Z
Modified
2026-03-20T12:42:35.147981Z
Summary
drm/v3d: Add job to pending list if the reset was skipped
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Add job to pending list if the reset was skipped

When a CL/CSD job times out, we check if the GPU has made any progress since the last timeout. If so, instead of resetting the hardware, we skip the reset and let the timer get rearmed. This gives long-running jobs a chance to complete.

However, when timedout_job() is called, the job in question is removed from the pending list, which means it won't be automatically freed through free_job(). Consequently, when we skip the reset and keep the job running, the job won't be freed when it finally completes.

This situation leads to a memory leak, as exposed in [1] and [2].

Similarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when GPU is still active"), this patch ensures the job is put back on the pending list when extending the timeout.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37951.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
57692c94dcbe99a1e0444409a3da13fb3443562c
Fixed
5235b56b7e5449d990d21d78723b1a5e7bb5738e
Fixed
12125f7d9c15e6d8ac91d10373b2db2f17dcf767
Fixed
a5f162727b91e480656da1876247a91f651f76de
Fixed
422a8b10ba42097a704d6909ada2956f880246f2
Fixed
35e4079bf1a2570abffce6ababa631afcf8ea0e5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37951.json"