๐Ÿ” CVE Alert

CVE-2025-39902

UNKNOWN 0.0

mm/slub: avoid accessing metadata when pointer is invalid in object_err()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
4th

In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
81819f0fc8285a2a5a921c019e3e3d7b6169d225 < 872f2c34ff232af1e65ad2df86d61163c8ffad42 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < f66012909e7bf383fcdc5850709ed5716073fdc4 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < 7e287256904ee796c9477e3ec92b07f236481ef3 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < 1f0797f17927b5cad0fb7eced422f9a7c30a3191 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < 0ef7058b4dc6fcef622ac23b45225db57f17b83f 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < dda6ec365ab04067adae40ef17015db447e90736 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < 3baa1da473e6e50281324ff1d332d1a07a3bb02e 81819f0fc8285a2a5a921c019e3e3d7b6169d225 < b4efccec8d06ceb10a7d34d7b1c449c569d53770
Linux / Linux
2.6.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/872f2c34ff232af1e65ad2df86d61163c8ffad42 git.kernel.org: https://git.kernel.org/stable/c/f66012909e7bf383fcdc5850709ed5716073fdc4 git.kernel.org: https://git.kernel.org/stable/c/7e287256904ee796c9477e3ec92b07f236481ef3 git.kernel.org: https://git.kernel.org/stable/c/1f0797f17927b5cad0fb7eced422f9a7c30a3191 git.kernel.org: https://git.kernel.org/stable/c/0ef7058b4dc6fcef622ac23b45225db57f17b83f git.kernel.org: https://git.kernel.org/stable/c/dda6ec365ab04067adae40ef17015db447e90736 git.kernel.org: https://git.kernel.org/stable/c/3baa1da473e6e50281324ff1d332d1a07a3bb02e git.kernel.org: https://git.kernel.org/stable/c/b4efccec8d06ceb10a7d34d7b1c449c569d53770 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html