In the Linux kernel, the following vulnerability has been resolved:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
object_err() reports details of an object for further debugging, such as
the freelist pointer, redzone, etc. However, if the pointer is invalid,
attempting to access object metadata can lead to a crash since it does
not point to a valid object.
One known path to the crash is when alloc_consistency_checks()
determines the pointer to the allocated object is invalid because of a
freelist corruption, and calls object_err() to report it. The debug code
should report and handle the corruption gracefully and not crash in the
process.
In case the pointer is NULL or check_valid_pointer() returns false for
the pointer, only print the pointer value and skip accessing metadata.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Jan 2026, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0ef7058b4dc6fcef622ac23b45225db57f17b83f - Patch | |
| References | () https://git.kernel.org/stable/c/1f0797f17927b5cad0fb7eced422f9a7c30a3191 - Patch | |
| References | () https://git.kernel.org/stable/c/3baa1da473e6e50281324ff1d332d1a07a3bb02e - Patch | |
| References | () https://git.kernel.org/stable/c/7e287256904ee796c9477e3ec92b07f236481ef3 - Patch | |
| References | () https://git.kernel.org/stable/c/872f2c34ff232af1e65ad2df86d61163c8ffad42 - Patch | |
| References | () https://git.kernel.org/stable/c/b4efccec8d06ceb10a7d34d7b1c449c569d53770 - Patch | |
| References | () https://git.kernel.org/stable/c/dda6ec365ab04067adae40ef17015db447e90736 - Patch | |
| References | () https://git.kernel.org/stable/c/f66012909e7bf383fcdc5850709ed5716073fdc4 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Oct 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 08:15
Updated : 2026-01-16 19:30
NVD link : CVE-2025-39902
Mitre link : CVE-2025-39902
CVE.ORG link : CVE-2025-39902
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
