CVE-2025-37908

HIGH

Linux Kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: mm, slab: clean up slab->obj_exts always When memory allocation profiling is disabled at runtime or due to an error, shutdown_mem_profiling() is called: slab->obj_exts which previously allocated remains. It won't be cleared by unaccount_slab() because of mem_alloc_profiling_enabled() not true. It's incorrect, slab->obj_exts should always be cleaned up in unaccount_slab() to avoid following error: [...]BUG: Bad page state in process... .. [...]page dumped because: page still charged to cgroup [[email protected]: fold need_slab_obj_ext() into its only user]

Scores

CVSS v3 7.8
EPSS 0.0005
EPSS Percentile 16.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-459
Status published
Products (4)
linux/Kernel 6.10.0 - 6.12.28linux
linux/Kernel 6.13.0 - 6.14.6linux
linux/linux_kernel 6.15 rc1 (4 CPE variants)
linux/linux_kernel 6.10 - 6.12.28
Published May 20, 2025
Tracked Since Feb 18, 2026