{"id":"CVE-2025-38521","summary":"drm/imagination: Fix kernel crash when hard resetting the GPU","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imagination: Fix kernel crash when hard resetting the GPU\n\nThe GPU hard reset sequence calls pm_runtime_force_suspend() and\npm_runtime_force_resume(), which according to their documentation should\nonly be used during system-wide PM transitions to sleep states.\n\nThe main issue though is that depending on some internal runtime PM\nstate as seen by pm_runtime_force_suspend() (whether the usage count is\n\u003c= 1), pm_runtime_force_resume() might not resume the device unless\nneeded. If that happens, the runtime PM resume callback\npvr_power_device_resume() is not called, the GPU clocks are not\nre-enabled, and the kernel crashes on the next attempt to access GPU\nregisters as part of the power-on sequence.\n\nReplace calls to pm_runtime_force_suspend() and\npm_runtime_force_resume() with direct calls to the driver's runtime PM\ncallbacks, pvr_power_device_suspend() and pvr_power_device_resume(),\nto ensure clocks are re-enabled and avoid the kernel crash.","modified":"2026-04-02T12:48:00.744032Z","published":"2025-08-16T10:55:08.373Z","related":["SUSE-SU-2025:03290-1","SUSE-SU-2025:03382-1","SUSE-SU-2025:03633-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38521.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/9f852d301f642223c4798f3c13ba15e91165d078"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d38376b3ee48d073c64e75e150510d7e6b4b04f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e066cc6e0f094ca2120f1928d126d56f686cd73e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38521.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38521"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cc1aeedb98ad347c06ff59e991b2f94dfb4c565d"},{"fixed":"9f852d301f642223c4798f3c13ba15e91165d078"},{"fixed":"e066cc6e0f094ca2120f1928d126d56f686cd73e"},{"fixed":"d38376b3ee48d073c64e75e150510d7e6b4b04f7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38521.json"}}],"schema_version":"1.7.5"}