CVE-2025-68293
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's memory management subsystem related to huge pages. Specifically, a recent change introduced a bug where the code accessed a mapping pointer without checking if it was NULL, leading to a NULL pointer dereference when splitting huge pages (folios) under certain conditions like shmem folios in the swap cache and truncated folios. The fix involved adding a check to ensure the mapping pointer is not NULL before accessing its flags.
How can this vulnerability impact me? :
The NULL pointer dereference can cause the Linux kernel to crash or become unstable when handling huge pages under specific conditions. This can lead to system crashes or denial of service, impacting system availability and reliability.