CVE-2025-71302
dma-fence Race Condition in Linux Kernel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability involves a race condition in accessing dma-fence objects in the Linux kernel's drm/panthor component. Such race conditions can potentially lead to unsafe memory access, which might cause system instability, crashes, or unexpected behavior in graphics-related operations. However, specific impacts or exploit scenarios are not detailed in the provided information.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel within the drm/panthor component. It relates to unsafe access rules involving dma-fence objects. Specifically, the issue arises because the function drm_sched_fence_get_timeline_name may race with group_free_queue, leading to unsafe access. The vulnerability was addressed by adding safe access helpers and documenting the dma-fence safe access rules.