CVE-2025-68774
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's HFS+ filesystem code when two threads concurrently call sync() and link(), leading both to attempt to create the same bnode in the hash table. Thread A creates the bnode and sets its reference count to 1, while Thread B also tries to create the same bnode but finds it already inserted and uses the existing one without properly increasing its reference count. This causes both threads to have a refcount of 1 instead of correctly incrementing it, which can later trigger a kernel bug due to incorrect reference counting. The fix involves calling hfs_bnode_get() to properly update the reference count when reusing a bnode created by another thread.
How can this vulnerability impact me? :
This vulnerability can lead to a kernel BUG_ON error due to incorrect reference counting of filesystem nodes, potentially causing system instability or crashes when the affected code paths are executed concurrently. This can impact system reliability and may lead to data corruption or denial of service if the kernel crashes or behaves unpredictably.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version that includes the patch for the missing hfs_bnode_get() call in __hfs_bnode_create. Therefore, the immediate mitigation step is to update your Linux kernel to the latest version where this fix is applied.