CVE-2025-71302
Received Received - Intake
dma-fence Race Condition in Linux Kernel

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: fix for dma-fence safe access rules Commit 506aa8b02a8d6 ("dma-fence: Add safe access helpers and document the rules") details the dma-fence safe access rules. The most common culprit is that drm_sched_fence_get_timeline_name may race with group_free_queue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability involves a race condition in accessing dma-fence objects in the Linux kernel's drm/panthor component. Such race conditions can potentially lead to unsafe memory access, which might cause system instability, crashes, or unexpected behavior in graphics-related operations. However, specific impacts or exploit scenarios are not detailed in the provided information.


Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel within the drm/panthor component. It relates to unsafe access rules involving dma-fence objects. Specifically, the issue arises because the function drm_sched_fence_get_timeline_name may race with group_free_queue, leading to unsafe access. The vulnerability was addressed by adding safe access helpers and documenting the dma-fence safe access rules.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart