CVE-2025-68252
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup In fastrpc_map_lookup, dma_buf_get is called to obtain a reference to the dma_buf for comparison purposes. However, this reference is never released when the function returns, leading to a dma_buf memory leak. Fix this by adding dma_buf_put before returning from the function, ensuring that the temporarily acquired reference is properly released regardless of whether a matching map is found. Rule: add
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory leak in the Linux kernel's fastrpc component. Specifically, in the function fastrpc_map_lookup, a reference to a dma_buf object is obtained using dma_buf_get but is never released with dma_buf_put. This causes the dma_buf object to leak memory because the reference count is not properly decremented. The fix involves adding dma_buf_put before the function returns to ensure the reference is released regardless of the outcome.


How can this vulnerability impact me? :

This vulnerability can lead to a memory leak in the Linux kernel, which over time may cause increased memory usage and potentially degrade system performance or stability. If exploited or triggered repeatedly, it could exhaust system resources, leading to crashes or denial of service.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch that fixes the dma_buf object leak in the fastrpc_map_lookup function by ensuring dma_buf_put is called to release the reference. This involves updating the Linux kernel to a version that includes this fix.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart