CVE-2025-37930
MEDIUMLinux Kernel - Reachable Assertion in nouveau_fence_context_kill()
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() Nouveau is mostly designed in a way that it's expected that fences only ever get signaled through nouveau_fence_signal(). However, in at least one other place, nouveau_fence_done(), can signal fences, too. If that happens (race) a signaled fence remains in the pending list for a while, until it gets removed by nouveau_fence_update(). Should nouveau_fence_context_kill() run in the meantime, this would be a bug because the function would attempt to set an error code on an already signaled fence. Have nouveau_fence_context_kill() check for a fence being signaled.
References (9)
Scores
CVSS v3
5.5
EPSS
0.0010
EPSS Percentile
27.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-617
Status
published
Products (9)
debian/debian_linux
11.0
linux/Kernel
5.11.0 - 5.15.182linux
linux/Kernel
5.16.0 - 6.1.138linux
linux/Kernel
5.6.0 - 5.10.238linux
linux/Kernel
6.13.0 - 6.14.6linux
linux/Kernel
6.2.0 - 6.6.90linux
linux/Kernel
6.7.0 - 6.12.28linux
linux/linux_kernel
6.15 rc1 (4 CPE variants)
linux/linux_kernel
5.6 - 5.10.238
Published
May 20, 2025
Tracked Since
Feb 18, 2026