CVE-2025-68233

Source
https://cve.org/CVERecord?id=CVE-2025-68233
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68233.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68233
Downstream
Related
Published
2025-12-16T14:04:13.490Z
Modified
2026-03-13T03:59:26.618503Z
Summary
drm/tegra: Add call to put_pid()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Add call to put_pid()

Add a call to putpid() corresponding to gettaskpid(). host1xmemorycontextalloc() does not take ownership of the PID so we need to free it here to avoid leaking.

[mperttunen@nvidia.com: reword commit message]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68233.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e09db97889ec647ad373f7a7422c83099c6120c5
Fixed
6b572e5154af08ee13f8d2673e86f83bc5ff86cd
Fixed
2e78580e6e7deac6556236ef96db5bbf7b46857e
Fixed
cbf2cbdb0733d7974dab296ffba0e7ae9b6524e5
Fixed
27ea5c2c75c3419a9a019240ca44b9256f628df1
Fixed
6cbab9f0da72b4dc3c3f9161197aa3b9daa1fa3a

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68233.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.118
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.60
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68233.json"