CVE-2025-68810
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) involves improper handling of the KVM_MEM_GUEST_MEMFD flag on memory slots (memslots). Specifically, the kernel fails to reject attempts to disable this flag on a memslot that was initially created with guest_memfd binding. While KVM prevents enabling this flag on existing memslots, it does not prevent clearing it, which leads to a use-after-free condition because KVM does not unbind from the guest_memfd instance properly. This can cause memory corruption and instability in the virtual machine environment.
How can this vulnerability impact me? :
The vulnerability can lead to a use-after-free memory corruption in the KVM subsystem of the Linux kernel. This can cause crashes, instability, or potentially allow an attacker with the ability to manipulate KVM memory slots to execute arbitrary code or escalate privileges within the virtualized environment, compromising the security and reliability of virtual machines.