CVE-2025-68751
BaseFortify
Publication date: 2026-01-05
Last updated on: 2026-01-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a false-positive report generated by the Kernel Memory Sanitizer (kmsan) in the Linux kernel's s390 architecture floating point unit (FPU) code, specifically in the fpu_vstl() function. The issue arises because an inline assembly instruction 'vstl' writes a variable number of bytes depending on a runtime value 'index', but the compiler (clang) incorrectly assumes it writes only 1 byte when instrumenting the code for kmsan. This mismatch causes kmsan to report uninitialized memory usage incorrectly when running commands like ping. The fix involves manually calling the kmsan function to indicate the correct number of bytes written, eliminating the false-positive report.
How can this vulnerability impact me? :
This vulnerability does not represent an actual security flaw or memory corruption but causes false-positive reports from the Kernel Memory Sanitizer (kmsan). This can lead to confusion during debugging or security analysis, as it may appear that there is uninitialized memory usage when there is none. Therefore, the impact is limited to potentially misleading diagnostic information rather than a direct security risk.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a false-positive kmsan (Kernel Memory Sanitizer) report, which can be detected by observing kernel logs for KMSAN bug messages related to uninitialized values, especially when running the ping command. You can check for such messages using the command: dmesg | grep KMSAN. Monitoring kernel logs for entries similar to 'BUG: KMSAN: uninit-value' can help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed in the Linux kernel by correcting the kmsan instrumentation for the inline assembly instruction 'vstl'. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix. There are no other immediate mitigation steps described.