We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22096

drm/msm/gem: Fix error code msm_parse_deps()



Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: Fix error code msm_parse_deps() The SUBMIT_ERROR() macro turns the error code negative. This extra '-' operation turns it back to positive EINVAL again. The error code is passed to ERR_PTR() and since positive values are not an IS_ERR() it eventually will lead to an oops. Delete the '-'. Patchwork: https://patchwork.freedesktop.org/patch/637625/

Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

866e43b945bf98f8e807dfa45eca92f931f3a032 before efe759dcf3352d8379a1adad7b4d14044a4c41a7
affected

866e43b945bf98f8e807dfa45eca92f931f3a032 before 0b305b7cadce835505bd93183a599acb1f800a05
affected

Default status
affected

6.14
affected

Any version before 6.14
unaffected

6.14.2
unaffected

6.15
unaffected

References

git.kernel.org/...c/efe759dcf3352d8379a1adad7b4d14044a4c41a7

git.kernel.org/...c/0b305b7cadce835505bd93183a599acb1f800a05

cve.org (CVE-2025-22096)

nvd.nist.gov (CVE-2025-22096)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22096

Support options

Helpdesk Chat, Email, Knowledgebase