CVE-2025-68204
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.18.0-rc1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ARM SCMI power domain management. If the function of_genpd_add_provider_onecell() fails during the device probe process, the previously created generic power domains are not properly removed. This leads to a memory leak and can cause a kernel crash later in the genpd_debug_add() function. The issue arises because error handling was missing to clean up initialized domains on failure, which has now been fixed by adding proper resource cleanup during probe failure.
How can this vulnerability impact me? :
The vulnerability can cause memory leaks in the Linux kernel, which may eventually lead to a kernel crash. This can result in system instability, unexpected reboots, or downtime, especially on ARM platforms using the affected power domain management code.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel version that includes the fix for the pmdomain: arm: scmi generic power domain leak. This fix ensures proper error handling during provider registration failure to prevent memory leaks and potential kernel crashes. Until the patch is applied, monitor for kernel crashes related to genpd_debug_add and consider avoiding affected hardware or kernel configurations if possible.