In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Remove WARN_ON_ONCE() call from ufshcd_uic_cmd_compl()
The UIC completion interrupt may be disabled while an UIC command is
being processed. When the UIC completion interrupt is reenabled, an UIC
interrupt is triggered and the WARN_ON_ONCE(!cmd) statement is hit.
Hence this patch that removes this kernel warning.
References
Configurations
Configuration 1 (hide)
|
History
24 Nov 2025, 17:55
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-617 | |
| References | () https://git.kernel.org/stable/c/c0cc24c139e0f62859dbf88e050ba074cd93988f - Patch | |
| References | () https://git.kernel.org/stable/c/e5203d89d59bfcbe1f348aa0d2dc4449a8ba644c - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
Information
Published : 2025-09-15 13:15
Updated : 2025-11-24 17:55
NVD link : CVE-2025-39803
Mitre link : CVE-2025-39803
CVE.ORG link : CVE-2025-39803
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-617
Reachable Assertion
