CVE-2025-38521

HIGH

Linux Kernel < 6.12.39 - Exposure to Wrong Actor

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Fix kernel crash when hard resetting the GPU The GPU hard reset sequence calls pm_runtime_force_suspend() and pm_runtime_force_resume(), which according to their documentation should only be used during system-wide PM transitions to sleep states. The main issue though is that depending on some internal runtime PM state as seen by pm_runtime_force_suspend() (whether the usage count is <= 1), pm_runtime_force_resume() might not resume the device unless needed. If that happens, the runtime PM resume callback pvr_power_device_resume() is not called, the GPU clocks are not re-enabled, and the kernel crashes on the next attempt to access GPU registers as part of the power-on sequence. Replace calls to pm_runtime_force_suspend() and pm_runtime_force_resume() with direct calls to the driver's runtime PM callbacks, pvr_power_device_suspend() and pvr_power_device_resume(), to ensure clocks are re-enabled and avoid the kernel crash.

Scores

CVSS v3 7.1
EPSS 0.0001
EPSS Percentile 2.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-668
Status published
Products (4)
linux/Kernel 6.13.0 - 6.15.7linux
linux/Kernel 6.8.0 - 6.12.39linux
linux/linux_kernel 6.16 rc1 (5 CPE variants)
linux/linux_kernel 6.8 - 6.12.39
Published Aug 16, 2025
Tracked Since Feb 18, 2026