Home

Description

In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before 872f2c34ff232af1e65ad2df86d61163c8ffad42
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before f66012909e7bf383fcdc5850709ed5716073fdc4
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before 7e287256904ee796c9477e3ec92b07f236481ef3
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before 1f0797f17927b5cad0fb7eced422f9a7c30a3191
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before 0ef7058b4dc6fcef622ac23b45225db57f17b83f
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before dda6ec365ab04067adae40ef17015db447e90736
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before 3baa1da473e6e50281324ff1d332d1a07a3bb02e
affected

81819f0fc8285a2a5a921c019e3e3d7b6169d225 before b4efccec8d06ceb10a7d34d7b1c449c569d53770
affected

Default status
affected

2.6.22
affected

Any version before 2.6.22
unaffected

5.4.299
unaffected

5.10.243
unaffected

5.15.192
unaffected

6.1.151
unaffected

6.6.105
unaffected

6.12.46
unaffected

6.16.6
unaffected

6.17
unaffected

References

git.kernel.org/...c/872f2c34ff232af1e65ad2df86d61163c8ffad42

git.kernel.org/...c/f66012909e7bf383fcdc5850709ed5716073fdc4

git.kernel.org/...c/7e287256904ee796c9477e3ec92b07f236481ef3

git.kernel.org/...c/1f0797f17927b5cad0fb7eced422f9a7c30a3191

git.kernel.org/...c/0ef7058b4dc6fcef622ac23b45225db57f17b83f

git.kernel.org/...c/dda6ec365ab04067adae40ef17015db447e90736

git.kernel.org/...c/3baa1da473e6e50281324ff1d332d1a07a3bb02e

git.kernel.org/...c/b4efccec8d06ceb10a7d34d7b1c449c569d53770

cve.org (CVE-2025-39902)

nvd.nist.gov (CVE-2025-39902)

Download JSON