CVE-2025-68816
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's firmware tracer (fw_tracer) for mlx5 devices, which receives format strings from device firmware to format trace messages. Without proper validation, malicious or malformed format strings containing unsafe specifiers (like %s, %p, %n) could cause crashes or undefined behavior. The fix adds validation to ensure only safe integer/hex format specifiers are allowed, rejecting unsafe ones and marking invalid strings visibly in the trace output.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause system crashes or undefined behavior due to malformed format strings from device firmware. This could lead to denial of service or potentially other security issues related to memory access violations.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that includes the fix for validating format string parameters in the firmware tracer (mlx5_tracer_validate_params). This update prevents unsafe format specifiers from causing crashes or undefined behavior. Until the patch is applied, monitor trace outputs for entries prefixed with "BAD_FORMAT: " which indicate invalid format strings.