{"api_version":"1","generated_at":"2026-04-24T07:21:40+00:00","cve":"CVE-2025-38436","urls":{"html":"https://cve.report/CVE-2025-38436","api":"https://cve.report/api/cve/CVE-2025-38436.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-38436","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-38436"},"summary":{"title":"drm/scheduler: signal scheduled fence when kill job","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/scheduler: signal scheduled fence when kill job\n\nWhen an entity from application B is killed, drm_sched_entity_kill()\nremoves all jobs belonging to that entity through\ndrm_sched_entity_kill_jobs_work(). If application A's job depends on a\nscheduled fence from application B's job, and that fence is not properly\nsignaled during the killing process, application A's dependency cannot be\ncleared.\n\nThis leads to application A hanging indefinitely while waiting for a\ndependency that will never be resolved. Fix this issue by ensuring that\nscheduled fences are properly signaled when an entity is killed, allowing\ndependent applications to continue execution.","state":"PUBLISHED","assigner":"Linux","published_at":"2025-07-25 15:15:29","updated_at":"2026-04-18 09:16:10"},"problem_types":["CWE-667"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"5.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/aa382a8b6ed483e9812d0e63b6d1bdcba0186f29","name":"https://git.kernel.org/stable/c/aa382a8b6ed483e9812d0e63b6d1bdcba0186f29","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c5734f9bab6f0d40577ad0633af4090a5fda2407","name":"https://git.kernel.org/stable/c/c5734f9bab6f0d40577ad0633af4090a5fda2407","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/8342127a8a65b0673863b106ce32b79c91ae3270","name":"https://git.kernel.org/stable/c/8342127a8a65b0673863b106ce32b79c91ae3270","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/471db2c2d4f80ee94225a1ef246e4f5011733e50","name":"https://git.kernel.org/stable/c/471db2c2d4f80ee94225a1ef246e4f5011733e50","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/aefd0a935625165a6ca36d0258d2d053901555df","name":"https://git.kernel.org/stable/c/aefd0a935625165a6ca36d0258d2d053901555df","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-38436","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38436","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a72ce6f84109c1dec1ab236d65979d3250668af3 8342127a8a65b0673863b106ce32b79c91ae3270 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a72ce6f84109c1dec1ab236d65979d3250668af3 c5734f9bab6f0d40577ad0633af4090a5fda2407 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a72ce6f84109c1dec1ab236d65979d3250668af3 aefd0a935625165a6ca36d0258d2d053901555df git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a72ce6f84109c1dec1ab236d65979d3250668af3 aa382a8b6ed483e9812d0e63b6d1bdcba0186f29 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a72ce6f84109c1dec1ab236d65979d3250668af3 471db2c2d4f80ee94225a1ef246e4f5011733e50 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 4.3","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.3 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.169 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.96 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.36 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.15.5 6.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.16 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"38436","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/gpu/drm/scheduler/sched_entity.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"8342127a8a65b0673863b106ce32b79c91ae3270","status":"affected","version":"a72ce6f84109c1dec1ab236d65979d3250668af3","versionType":"git"},{"lessThan":"c5734f9bab6f0d40577ad0633af4090a5fda2407","status":"affected","version":"a72ce6f84109c1dec1ab236d65979d3250668af3","versionType":"git"},{"lessThan":"aefd0a935625165a6ca36d0258d2d053901555df","status":"affected","version":"a72ce6f84109c1dec1ab236d65979d3250668af3","versionType":"git"},{"lessThan":"aa382a8b6ed483e9812d0e63b6d1bdcba0186f29","status":"affected","version":"a72ce6f84109c1dec1ab236d65979d3250668af3","versionType":"git"},{"lessThan":"471db2c2d4f80ee94225a1ef246e4f5011733e50","status":"affected","version":"a72ce6f84109c1dec1ab236d65979d3250668af3","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/gpu/drm/scheduler/sched_entity.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"4.3"},{"lessThan":"4.3","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.169","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.96","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.36","versionType":"semver"},{"lessThanOrEqual":"6.15.*","status":"unaffected","version":"6.15.5","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.16","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.169","versionStartIncluding":"4.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.96","versionStartIncluding":"4.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.36","versionStartIncluding":"4.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.15.5","versionStartIncluding":"4.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.16","versionStartIncluding":"4.3","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/scheduler: signal scheduled fence when kill job\n\nWhen an entity from application B is killed, drm_sched_entity_kill()\nremoves all jobs belonging to that entity through\ndrm_sched_entity_kill_jobs_work(). If application A's job depends on a\nscheduled fence from application B's job, and that fence is not properly\nsignaled during the killing process, application A's dependency cannot be\ncleared.\n\nThis leads to application A hanging indefinitely while waiting for a\ndependency that will never be resolved. Fix this issue by ensuring that\nscheduled fences are properly signaled when an entity is killed, allowing\ndependent applications to continue execution."}],"providerMetadata":{"dateUpdated":"2026-04-18T08:56:56.830Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/8342127a8a65b0673863b106ce32b79c91ae3270"},{"url":"https://git.kernel.org/stable/c/c5734f9bab6f0d40577ad0633af4090a5fda2407"},{"url":"https://git.kernel.org/stable/c/aefd0a935625165a6ca36d0258d2d053901555df"},{"url":"https://git.kernel.org/stable/c/aa382a8b6ed483e9812d0e63b6d1bdcba0186f29"},{"url":"https://git.kernel.org/stable/c/471db2c2d4f80ee94225a1ef246e4f5011733e50"}],"title":"drm/scheduler: signal scheduled fence when kill job","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2025-38436","datePublished":"2025-07-25T14:32:09.945Z","dateReserved":"2025-04-16T04:51:24.016Z","dateUpdated":"2026-04-18T08:56:56.830Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-07-25 15:15:29","lastModifiedDate":"2026-04-18 09:16:10","problem_types":["CWE-667"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"6.6.96","matchCriteriaId":"F0728C84-7187-4266-82A6-45CF39DEE5BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.12.36","matchCriteriaId":"2BD88DEC-018F-4F40-8E29-A2CA89813EBA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.15.5","matchCriteriaId":"0CC768E2-3BBC-4A6E-9C2F-ECB27A703C2D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"38436","Ordinal":"1","Title":"drm/scheduler: signal scheduled fence when kill job","CVE":"CVE-2025-38436","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"38436","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/scheduler: signal scheduled fence when kill job\n\nWhen an entity from application B is killed, drm_sched_entity_kill()\nremoves all jobs belonging to that entity through\ndrm_sched_entity_kill_jobs_work(). If application A's job depends on a\nscheduled fence from application B's job, and that fence is not properly\nsignaled during the killing process, application A's dependency cannot be\ncleared.\n\nThis leads to application A hanging indefinitely while waiting for a\ndependency that will never be resolved. Fix this issue by ensuring that\nscheduled fences are properly signaled when an entity is killed, allowing\ndependent applications to continue execution.","Type":"Description","Title":"drm/scheduler: signal scheduled fence when kill job"}]}}}