CVE-2025-37930

MEDIUM

Linux Kernel - Reachable Assertion in nouveau_fence_context_kill()

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() Nouveau is mostly designed in a way that it's expected that fences only ever get signaled through nouveau_fence_signal(). However, in at least one other place, nouveau_fence_done(), can signal fences, too. If that happens (race) a signaled fence remains in the pending list for a while, until it gets removed by nouveau_fence_update(). Should nouveau_fence_context_kill() run in the meantime, this would be a bug because the function would attempt to set an error code on an already signaled fence. Have nouveau_fence_context_kill() check for a fence being signaled.

Scores

CVSS v3 5.5
EPSS 0.0010
EPSS Percentile 27.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-617
Status published
Products (9)
debian/debian_linux 11.0
linux/Kernel 5.11.0 - 5.15.182linux
linux/Kernel 5.16.0 - 6.1.138linux
linux/Kernel 5.6.0 - 5.10.238linux
linux/Kernel 6.13.0 - 6.14.6linux
linux/Kernel 6.2.0 - 6.6.90linux
linux/Kernel 6.7.0 - 6.12.28linux
linux/linux_kernel 6.15 rc1 (4 CPE variants)
linux/linux_kernel 5.6 - 5.10.238
Published May 20, 2025
Tracked Since Feb 18, 2026