CVE-2025-68730
Description
In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
Don't add BO to the vdev->bo_list in ivpu_gem_create_object(). When failure happens inside drm_gem_shmem_create(), the BO is not fully created and ivpu_gem_bo_free() callback will not be called causing a deleted BO to be left on the list.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's accel/ivpu driver, improper BO list addition before full creation can cause a page fault when BO creation fails, leaving a deleted entry.
Vulnerability
Description
In the Linux kernel's accel/ivpu driver, the function ivpu_gem_create_object() adds a newly created buffer object (BO) to the vdev->bo_list before the underlying drm_gem_shmem_create() call has fully completed. If that call fails (e.g., due to memory allocation errors), the partially-created BO is freed, but it remains in the list. This dangling pointer leads to a use-after-free condition when the list is subsequently traversed by functions such as ivpu_bo_unbind_all_bos_from_context(), causing a page fault [1].
Attack
Vector
The vulnerability can be triggered by an attacker that is able to cause a failure in BO creation within the VPU driver. This may be achieved through local access that exhausts memory or other resources, or by exploiting race conditions. No authentication is required other than the ability to interact with the VPU subsystem (typically requiring local user access). The attack surface is limited to systems using the Intel VPU accelerator hardware and the affected kernel version.
Impact
Successful exploitation results in a kernel page fault, leading to a system crash or denial of service. In some cases, memory corruption could occur, potentially allowing privilege escalation, but the primary impact is on system availability.
Mitigation
The fix has been applied in the Linux kernel via commit [1], which moves the list insertion to occur only after drm_gem_shmem_create() succeeds. Users should update their kernels to include this patch. There is no known workaround other than applying the update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.