CVE-2025-68209
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's mlx5 driver involves the creation of Completion Queues (CQs). By default, CQs without a completion function are assigned a function intended only for user CQs, which can cause a null pointer exception if triggered. Additionally, kernel CQs that use doorbells instead of polling must be properly armed, but the default creation flow leaves a valid arm_db value, allowing firmware to send interrupts to polling-only CQs in some cases. This can cause a polling-only kernel CQ to be triggered incorrectly, leading to a null pointer exception. The fix adds default dummy completion functions and invalid command sequence numbers to prevent these issues.
How can this vulnerability impact me? :
This vulnerability can cause a null pointer exception in the kernel when a polling-only Completion Queue is incorrectly triggered by an interrupt. This could lead to kernel instability or crashes, potentially affecting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the mlx5 create CQ defaults. This patch adds a default dummy completion function and sets an invalid command sequence number by default in kernel CQs to prevent null pointer exceptions and unwanted interrupts. Ensure that callers of mlx5_core_create_cq properly set the completion function and arm the CQ as needed.