CVE-2025-68199
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.18.0-rc1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's slab allocator where an error in handling slab object extensions can cause incorrect marking of objects as empty. Specifically, when allocation of slab object extensions fails and then later succeeds, the system marks all objects in a slab as empty using a special marker (CODETAG_EMPTY). If this slab is reused for another allocation, the new slab's object extensions may incorrectly point to this marker instead of being NULL, which leads to warnings and potential kernel bugs when the slab is freed. The fix modifies the code to skip warnings and avoid resetting the marker if it is already set to CODETAG_EMPTY.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and potentially trigger kernel bugs or crashes (kernel BUGs) due to improper handling of slab object extensions. This can lead to system instability or crashes, affecting the reliability and availability of systems running the affected Linux kernel versions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific BUG or WARN messages related to slab object extensions. For example, the kernel log may show messages like 'kernel BUG at mm/slub.c:2050!' or warnings generated by mark_objexts_empty(). You can check the kernel logs using commands such as 'dmesg | grep -i BUG' or 'dmesg | grep -i slab' to look for these indicators. Additionally, modifying the kernel code to change WARN_ON to BUG_ON as described can help in detecting the issue during testing.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The fix modifies the mark_objexts_empty() function to skip warnings and setting the obj_ext value if it is already set to CODETAG_EMPTY, preventing the BUG from occurring. Until the patch is applied, monitoring kernel logs for related BUG or WARN messages and avoiding workloads that trigger slab object extension allocations may reduce risk.