
Cloud Vulnerability DB
A community-led vulnerabilities database
A reference count leak vulnerability was discovered in the Linux kernel's DRM scheduler component (CVE-2025-21995). The vulnerability was disclosed on April 3, 2025, affecting the fence reference counting mechanism in the drm/sched subsystem (NVD).
The vulnerability occurs when the lastscheduled fence leaks during entity termination due to a cleanup callback failure. Specifically, when an entity is being killed and the dmafenceaddcallback() operation fails, the reference count of the previous fence is not properly decremented, leading to a resource leak (NVD).
The reference count leak in the DRM scheduler could potentially lead to resource exhaustion in the Linux kernel, though the specific impact severity has not been fully assessed as the CVSS score was not yet assigned at the time of disclosure (NVD).
The vulnerability has been fixed in various Linux distributions. Debian has marked this as fixed in multiple releases including bullseye (5.10.234-1), bookworm (6.1.133-1), trixie (6.12.21-1), and sid (6.12.22-1) (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."