VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68730

CVE-2025-68730

Description

In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()

Don't add BO to the vdev->bo_list in ivpu_gem_create_object(). When failure happens inside drm_gem_shmem_create(), the BO is not fully created and ivpu_gem_bo_free() callback will not be called causing a deleted BO to be left on the list.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's accel/ivpu driver, improper BO list addition before full creation can cause a page fault when BO creation fails, leaving a deleted entry.

Vulnerability

Description

In the Linux kernel's accel/ivpu driver, the function ivpu_gem_create_object() adds a newly created buffer object (BO) to the vdev->bo_list before the underlying drm_gem_shmem_create() call has fully completed. If that call fails (e.g., due to memory allocation errors), the partially-created BO is freed, but it remains in the list. This dangling pointer leads to a use-after-free condition when the list is subsequently traversed by functions such as ivpu_bo_unbind_all_bos_from_context(), causing a page fault [1].

Attack

Vector

The vulnerability can be triggered by an attacker that is able to cause a failure in BO creation within the VPU driver. This may be achieved through local access that exhausts memory or other resources, or by exploiting race conditions. No authentication is required other than the ability to interact with the VPU subsystem (typically requiring local user access). The attack surface is limited to systems using the Intel VPU accelerator hardware and the affected kernel version.

Impact

Successful exploitation results in a kernel page fault, leading to a system crash or denial of service. In some cases, memory corruption could occur, potentially allowing privilege escalation, but the primary impact is on system availability.

Mitigation

The fix has been applied in the Linux kernel via commit [1], which moves the list insertion to occur only after drm_gem_shmem_create() succeeds. Users should update their kernels to include this patch. There is no known workaround other than applying the update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.