CVE-2025-68233Missing Release of Resource after Effective Lifetime in Linux

Severity
7.2HIGHOSV
OSV3.2
No vector
EPSS
0.1%
top 84.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 16
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [[email protected]: reword commit message]

Affected Packages7 packages

Linuxlinux/linux_kernel6.0.06.1.159+3
Debianlinux/linux_kernel< 6.1.159-1+2
Ubuntulinux/linux_kernel< 6.8.0-106.106+1
CVEListV5linux/linuxe09db97889ec647ad373f7a7422c83099c6120c56b572e5154af08ee13f8d2673e86f83bc5ff86cd+5

🔴Vulnerability Details

17
OSV
linux-oem-6.17 vulnerabilities2026-04-06
OSV
linux-raspi, linux-raspi-realtime vulnerabilities2026-04-01
OSV
linux-raspi vulnerabilities2026-04-01
OSV
linux-azure, linux-azure-6.17 vulnerabilities2026-03-25
OSV
linux-azure-6.8 vulnerabilities2026-03-25

📋Vendor Advisories

18
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-04-09
Ubuntu
Linux kernel (OEM) vulnerabilities2026-04-06
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2025-68233 Impact, Exploitability, and Mitigation Steps | Wiz