CVE-2025-68772
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's f2fs filesystem related to compression context updates during writeback. Specifically, when multiple threads perform file operations like fsync, setattr, or ioctl on compressed and non-compressed files, a divide-by-zero error can occur due to improper handling of the compression context. The issue arises because the compression context is updated without proper synchronization, leading to a divide error in the function f2fs_all_cluster_page_ready. The fix involves introducing an atomic variable to track concurrent writeback calls and using locking mechanisms to prevent race conditions when updating the compression context.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (divide error) leading to system instability or denial of service. Since it occurs during file writeback operations, it may disrupt normal file system operations, potentially causing data loss or corruption if the system crashes during critical file operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the f2fs compression context race condition during writeback. The fix involves kernel changes that introduce atomic tracking and locking to prevent the race condition. Applying the latest kernel patches or updates that address this issue is the recommended immediate step.