CVE-2025-68240
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the nilfs2 issue with sc_timer and sc_task has been fixed. The fix involves proper shutdown of sc_timer using timer_shutdown_sync() and setting sc_task to NULL under lock protection. Applying the official patch or kernel update that addresses this issue is the recommended immediate step.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's nilfs2 filesystem involves improper handling of a timer (sc_timer) when freeing a structure (sci). Specifically, the function kthread_stop did not properly stop the sc_task thread, causing the sc_timer to remain active and not be closed correctly. This improper shutdown of the timer can lead to issues such as use-after-free or other memory management problems during the freeing process.
How can this vulnerability impact me? :
The vulnerability can cause improper shutdown of a timer in the nilfs2 filesystem, potentially leading to system instability, crashes, or memory corruption. This could affect the reliability and security of systems using the affected Linux kernel version, possibly resulting in denial of service or other unintended behavior.