CVE-2025-68260
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rust | rust_binder | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Rust Binder component of the Linux kernel. It involves unsafe operations on a linked list's prev/next pointers without proper synchronization between threads. Specifically, the unsafe remove method can be called on a node that might be present in a different list accessed concurrently by another thread, leading to data races and memory corruption. This causes kernel crashes due to invalid memory accesses.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption and kernel crashes, causing system instability or denial of service. This can disrupt normal operation of the Linux kernel on affected systems, potentially leading to unexpected reboots or loss of functionality.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by a race condition in the rust_binder component of the Linux kernel. To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for this issue, which modifies Node::release to pop items directly off the original list instead of moving them to a local list. This prevents memory corruption and crashes caused by the unsafe remove operation. Applying the official patch or upgrading to the fixed kernel version is the recommended immediate step.