CVE-2025-68748
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Fix UAF race between device unplug and FW event processing
The function panthor_fw_unplug() will free the FW memory sections. The problem is that there could still be pending FW events which are yet not handled at this point. process_fw_events_work() can in this case try to access said freed memory.
Simply call disable_work_sync() to both drain and prevent future invocation of process_fw_events_work().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free race in panthor DRM driver during device unplug due to unsynchronized firmware event processing; fix calls disable_work_sync().
Vulnerability
In the Linux kernel's drm/panthor driver, a use-after-free (UAF) race condition exists between device unplug and firmware (FW) event processing. The function panthor_fw_unplug() frees FW memory sections, but pending FW events that have not yet been handled can subsequently access that freed memory, leading to a use-after-free [1].
Exploitation
An attacker with local access and the ability to trigger device unplug while FW events are pending could exploit this race condition. The vulnerability does not require special privileges beyond the ability to interact with the panthor device. The race window is between freeing the memory and the completion of event processing.
Impact
Successful exploitation could lead to memory corruption, system crash, or potentially privilege escalation if an attacker can control the freed memory contents.
Mitigation
The fix, provided in commit [1] and backported to stable trees [2][3][4], replaces the unsynchronized cleanup with disable_work_sync() to drain and prevent future invocation of process_fw_events_work(), ensuring no events are processed after memory is freed. Users should apply the latest kernel updates.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.