CVE-2025-68373
Use-After-Free Race Condition in Linux Kernel md Component
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (uaf) problem in the Linux kernel's md (multiple device) subsystem caused by repeated calls to the function del_gendisk. A race condition occurs when two paths (rdev remove path and md stop path) both call del_gendisk due to improper synchronization, leading to a general protection fault. The issue arises because the md stop path sets a flag MD_DELETED and calls del_gendisk, and then the rdev remove path also calls del_gendisk again, causing the use-after-free. The patch adds a flag MD_DO_DELETE to prevent this race condition.
How can this vulnerability impact me? :
This vulnerability can cause a system crash (general protection fault) due to a use-after-free error in the Linux kernel's md subsystem. This can lead to instability, potential denial of service, and unexpected behavior in systems using the affected kernel, impacting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that adds the MD_DO_DELETE flag to avoid the race condition causing the use-after-free. This involves updating the Linux kernel to the fixed version where this issue is resolved.