In the Linux kernel, the following vulnerability has been resolved:
drm/v3d: Ensure job pointer is set to NULL after job completion
After a job completes, the corresponding pointer in the device must
be set to NULL. Failing to do so triggers a warning when unloading
the driver, as it appears the job is still active. To prevent this,
assign the job pointer to NULL after completing the job, indicating
the job has finished.
References
Configurations
Configuration 1 (hide)
|
History
14 Feb 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
First Time |
Linux linux Kernel
Linux |
|
Summary |
|
|
References | () https://git.kernel.org/stable/c/14e0a874488e79086340ba8e2d238cb9596b68a8 - Patch | |
References | () https://git.kernel.org/stable/c/1bd6303d08c85072ce40ac01a767ab67195105bd - Patch | |
References | () https://git.kernel.org/stable/c/2a1c88f7ca5c12dff6fa6787492ac910bb9e4407 - Patch | |
References | () https://git.kernel.org/stable/c/63195bae1cbf78f1d392b1bc9ae4b03c82d0ebf3 - Patch | |
References | () https://git.kernel.org/stable/c/a34050f70e7955a359874dff1a912a748724a140 - Patch | |
References | () https://git.kernel.org/stable/c/b22467b1ae104073dcb11aa78562a331cd7fb0e0 - Patch | |
References | () https://git.kernel.org/stable/c/e4b5ccd392b92300a2b341705cc4805681094e49 - Patch |
12 Feb 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-12 14:15
Updated : 2025-02-14 14:13
NVD link : CVE-2025-21697
Mitre link : CVE-2025-21697
CVE.ORG link : CVE-2025-21697
JSON object : View
Products Affected
linux
- linux_kernel
CWE