-

CVE-2025-68732

In the Linux kernel, the following vulnerability has been resolved:

gpu: host1x: Fix race in syncpt alloc/free

Fix race condition between host1x_syncpt_alloc()
and host1x_syncpt_put() by using kref_put_mutex()
instead of kref_put() + manual mutex locking.

This ensures no thread can acquire the
syncpt_mutex after the refcount drops to zero
but before syncpt_release acquires it.
This prevents races where syncpoints could
be allocated while still being cleaned up
from a previous release.

Remove explicit mutex locking in syncpt_release
as kref_put_mutex() handles this atomically.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < ca9388fba50dac2eb71c13702b7022a801bef90e
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < 4aeaece518fa4436af93d1d8b786200d9656ff4b
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < 6245cce711e2cdb2cc75c0bb8632952e36f8c972
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < 4e6e07ce0197aecfb6c4a62862acc93b3efedeb7
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < d138f73ffb0c57ded473c577719e6e551b7b1f27
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < 79197c6007f2afbfd7bcf5b9b80ccabf8483d774
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
Version < c7d393267c497502fa737607f435f05dfe6e3d9b
Version f5ba33fb9690566c382624637125827b5512e766
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.