{"id":"CVE-2025-68732","summary":"gpu: host1x: Fix race in syncpt alloc/free","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpu: host1x: Fix race in syncpt alloc/free\n\nFix race condition between host1x_syncpt_alloc()\nand host1x_syncpt_put() by using kref_put_mutex()\ninstead of kref_put() + manual mutex locking.\n\nThis ensures no thread can acquire the\nsyncpt_mutex after the refcount drops to zero\nbut before syncpt_release acquires it.\nThis prevents races where syncpoints could\nbe allocated while still being cleaned up\nfrom a previous release.\n\nRemove explicit mutex locking in syncpt_release\nas kref_put_mutex() handles this atomically.","modified":"2026-05-18T05:58:21.205069927Z","published":"2025-12-24T10:33:14.664Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68732.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4aeaece518fa4436af93d1d8b786200d9656ff4b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e6e07ce0197aecfb6c4a62862acc93b3efedeb7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6245cce711e2cdb2cc75c0bb8632952e36f8c972"},{"type":"WEB","url":"https://git.kernel.org/stable/c/79197c6007f2afbfd7bcf5b9b80ccabf8483d774"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c7d393267c497502fa737607f435f05dfe6e3d9b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca9388fba50dac2eb71c13702b7022a801bef90e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d138f73ffb0c57ded473c577719e6e551b7b1f27"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68732.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68732"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f5ba33fb9690566c382624637125827b5512e766"},{"fixed":"ca9388fba50dac2eb71c13702b7022a801bef90e"},{"fixed":"4aeaece518fa4436af93d1d8b786200d9656ff4b"},{"fixed":"6245cce711e2cdb2cc75c0bb8632952e36f8c972"},{"fixed":"4e6e07ce0197aecfb6c4a62862acc93b3efedeb7"},{"fixed":"d138f73ffb0c57ded473c577719e6e551b7b1f27"},{"fixed":"79197c6007f2afbfd7bcf5b9b80ccabf8483d774"},{"fixed":"c7d393267c497502fa737607f435f05dfe6e3d9b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68732.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68732.json"}}],"schema_version":"1.7.5"}