CVE-2025-21697

In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Ensure job pointer is set to NULL after job completion After a job completes, the corresponding pointer in the device must be set to NULL. Failing to do so triggers a warning when unloading the driver, as it appears the job is still active. To prevent this, assign the job pointer to NULL after completing the job, indicating the job has finished.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*

History

14 Feb 2025, 14:13

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/2a1c88f7ca5c12dff6fa6787492ac910bb9e4407 - () https://git.kernel.org/stable/c/2a1c88f7ca5c12dff6fa6787492ac910bb9e4407 - Patch
References () https://git.kernel.org/stable/c/14e0a874488e79086340ba8e2d238cb9596b68a8 - () https://git.kernel.org/stable/c/14e0a874488e79086340ba8e2d238cb9596b68a8 - Patch
References () https://git.kernel.org/stable/c/63195bae1cbf78f1d392b1bc9ae4b03c82d0ebf3 - () https://git.kernel.org/stable/c/63195bae1cbf78f1d392b1bc9ae4b03c82d0ebf3 - Patch
References () https://git.kernel.org/stable/c/a34050f70e7955a359874dff1a912a748724a140 - () https://git.kernel.org/stable/c/a34050f70e7955a359874dff1a912a748724a140 - Patch
References () https://git.kernel.org/stable/c/1bd6303d08c85072ce40ac01a767ab67195105bd - () https://git.kernel.org/stable/c/1bd6303d08c85072ce40ac01a767ab67195105bd - Patch
References () https://git.kernel.org/stable/c/e4b5ccd392b92300a2b341705cc4805681094e49 - () https://git.kernel.org/stable/c/e4b5ccd392b92300a2b341705cc4805681094e49 - Patch
References () https://git.kernel.org/stable/c/b22467b1ae104073dcb11aa78562a331cd7fb0e0 - () https://git.kernel.org/stable/c/b22467b1ae104073dcb11aa78562a331cd7fb0e0 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

12 Feb 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-12 14:15

Updated : 2025-02-14 14:13


NVD link : CVE-2025-21697

Mitre link : CVE-2025-21697


JSON object : View

Products Affected

linux

  • linux_kernel