CVE-2025-68248
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's vmw_balloon driver during memory page migration. When migrating a balloon page, the old page is deflated before inflating the new page. If inflating the new page succeeds, the old page is effectively deflated and should be freed. However, due to an error return, the old page remains marked as isolated, causing a warning when the system later tries to put the page back. The fix changes the code to return success (0) in this case, allowing the page to be properly freed and avoiding inconsistent page isolation states.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to incorrectly handle memory pages during balloon page migration, leading to pages remaining marked as isolated and triggering warnings (WARN_ON_ONCE) in the kernel. This could potentially result in inefficient memory management or instability related to balloon memory operations during migration.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the handling of balloon page migration in the Linux kernel, specifically the change that returns 0 when effectively deflating during migration to prevent pages from being left isolated and causing WARN_ON_ONCE() errors. This ensures the kernel properly frees pages and maintains consistency. Updating the Linux kernel to a version including this fix is the recommended mitigation.