CVE-2025-39902
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's memory management subsystem (mm/slub). Specifically, the function object_err() attempts to access metadata of an object pointer for debugging purposes. If the pointer is invalid or corrupted, accessing this metadata can cause the kernel to crash. The issue arises when alloc_consistency_checks() detects a corrupted freelist pointer and calls object_err() to report it, but object_err() does not handle invalid pointers safely, leading to a crash. The fix ensures that if the pointer is NULL or invalid, object_err() only prints the pointer value without accessing metadata, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when it tries to access invalid object metadata during debugging of memory allocation issues. Such crashes can lead to system instability, unexpected reboots, or denial of service, impacting the availability and reliability of systems running vulnerable kernel versions.