CVE-2025-21697
drm/v3d: Ensure job pointer is set to NULL after job completion
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Ensure job pointer is set to NULL after job completion After a job completes, the corresponding pointer in the device must be set to NULL. Failing to do so triggers a warning when unloading the driver, as it appears the job is still active. To prevent this, assign the job pointer to NULL after completing the job, indicating the job has finished.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 12, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
14d1d190869685d3a1e8a3f63924e20594557cb2 < 1bd6303d08c85072ce40ac01a767ab67195105bd 14d1d190869685d3a1e8a3f63924e20594557cb2 < a34050f70e7955a359874dff1a912a748724a140 14d1d190869685d3a1e8a3f63924e20594557cb2 < 14e0a874488e79086340ba8e2d238cb9596b68a8 14d1d190869685d3a1e8a3f63924e20594557cb2 < 2a1c88f7ca5c12dff6fa6787492ac910bb9e4407 14d1d190869685d3a1e8a3f63924e20594557cb2 < 63195bae1cbf78f1d392b1bc9ae4b03c82d0ebf3 14d1d190869685d3a1e8a3f63924e20594557cb2 < b22467b1ae104073dcb11aa78562a331cd7fb0e0 14d1d190869685d3a1e8a3f63924e20594557cb2 < e4b5ccd392b92300a2b341705cc4805681094e49
Linux / Linux
4.19
References
git.kernel.org: https://git.kernel.org/stable/c/1bd6303d08c85072ce40ac01a767ab67195105bd git.kernel.org: https://git.kernel.org/stable/c/a34050f70e7955a359874dff1a912a748724a140 git.kernel.org: https://git.kernel.org/stable/c/14e0a874488e79086340ba8e2d238cb9596b68a8 git.kernel.org: https://git.kernel.org/stable/c/2a1c88f7ca5c12dff6fa6787492ac910bb9e4407 git.kernel.org: https://git.kernel.org/stable/c/63195bae1cbf78f1d392b1bc9ae4b03c82d0ebf3 git.kernel.org: https://git.kernel.org/stable/c/b22467b1ae104073dcb11aa78562a331cd7fb0e0 git.kernel.org: https://git.kernel.org/stable/c/e4b5ccd392b92300a2b341705cc4805681094e49 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html