First published: Wed Feb 12 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Ensure job pointer is set to NULL after job completion After a job completes, the corresponding pointer in the device must be set to NULL. Failing to do so triggers a warning when unloading the driver, as it appears the job is still active. To prevent this, assign the job pointer to NULL after completing the job, indicating the job has finished.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.19<5.4.290 | |
Linux Kernel | >=5.5<5.10.234 | |
Linux Kernel | >=5.11<5.15.177 | |
Linux Kernel | >=5.16<6.1.127 | |
Linux Kernel | >=6.2<6.6.74 | |
Linux Kernel | >=6.7<6.12.11 | |
Linux Kernel | =6.13-rc1 | |
Linux Kernel | =6.13-rc2 | |
Linux Kernel | =6.13-rc3 | |
Linux Kernel | =6.13-rc4 | |
Linux Kernel | =6.13-rc5 | |
Linux Kernel | =6.13-rc6 | |
Linux Kernel | =6.13-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21697 has a medium severity rating due to the potential for driver unloading warnings that may affect system stability.
To fix CVE-2025-21697, ensure that you update to the latest version of the Linux kernel where this vulnerability is addressed.
The impact of CVE-2025-21697 primarily affects the ability to unload the driver cleanly, potentially causing system instability.
CVE-2025-21697 affects systems running specific versions of the Linux kernel with the DRM V3D component.
As of now, there are no public reports of CVE-2025-21697 being actively exploited in the wild.