Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm: make sure last_fence is always updated Update last_fence in the vm-bind path instead of kernel managed path. last_fence is used to wait for work to finish in vm_bind contexts but not used for kernel managed contexts. This fixes a bug where last_fence is not waited on context close leading to faults as resources are freed while in use. Patchwork: https://patchwork.freedesktop.org/patch/680080/

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

92395af63a9958615edfa9d4ef1ea72c92a00410 (git) before 8ee817ceafba266d9c6f3a09babd2ac7441d9a2b
affected

92395af63a9958615edfa9d4ef1ea72c92a00410 (git) before 86404a9e3013d814a772ac407573be5d3cd4ee0d
affected

Default status
affected

6.17
affected

Any version before 6.17
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8ee817ceafba266d9c6f3a09babd2ac7441d9a2b

git.kernel.org/...c/86404a9e3013d814a772ac407573be5d3cd4ee0d

cve.org (CVE-2025-68314)

nvd.nist.gov (CVE-2025-68314)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.