{"id":"CVE-2025-68252","summary":"misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup\n\nIn fastrpc_map_lookup, dma_buf_get is called to obtain a reference to\nthe dma_buf for comparison purposes. However, this reference is never\nreleased when the function returns, leading to a dma_buf memory leak.\n\nFix this by adding dma_buf_put before returning from the function,\nensuring that the temporarily acquired reference is properly released\nregardless of whether a matching map is found.\n\nRule: add","modified":"2026-03-31T17:29:52.451240262Z","published":"2025-12-16T14:32:18.819Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68252.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/214e81a63a9aa0be42382ef0365ba5ed32c513ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a297a68c3ba4a7ecb31ed52f61bd6634abb79d3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2fef5ebb73f3dabae6fbc571d181914ed32c483"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e17b13387827adce7acb19ac0f07f9bcafe0ff4c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fff111bf45cbeeb659324316d68554e35d350092"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68252.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68252"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ec5cb80503bbfee67573699fe52fcf456fd57678"},{"fixed":"c2fef5ebb73f3dabae6fbc571d181914ed32c483"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6e0d6cc39f410a4d9ea774fbb254c68fe02ff4bb"},{"fixed":"9a297a68c3ba4a7ecb31ed52f61bd6634abb79d3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6e0928a8988e873da9946e17f8065ad77c720186"},{"fixed":"e17b13387827adce7acb19ac0f07f9bcafe0ff4c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1986bba9597b3d97d3e80530dc457a1cd1994e22"},{"fixed":"214e81a63a9aa0be42382ef0365ba5ed32c513ab"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9031626ade38b092b72638dfe0c6ffce8d8acd43"},{"fixed":"fff111bf45cbeeb659324316d68554e35d350092"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68252.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.1.156"},{"fixed":"6.1.158"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.6.112"},{"fixed":"6.6.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.12.53"},{"fixed":"6.12.56"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.17.3"},{"fixed":"6.17.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68252.json"}}],"schema_version":"1.7.5"}