In the Linux kernel, the following vulnerability has been resolved:
mm, slab: clean up slab->obj_exts always
When memory allocation profiling is disabled at runtime or due to an
error, shutdown_mem_profiling() is called: slab->obj_exts which
previously allocated remains.
It won't be cleared by unaccount_slab() because of
mem_alloc_profiling_enabled() not true. It's incorrect, slab->obj_exts
should always be cleaned up in unaccount_slab() to avoid following error:
[...]BUG: Bad page state in process...
..
[...]page dumped because: page still charged to cgroup
[[email protected]: fold need_slab_obj_ext() into its only user]
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 14:58
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-459 | |
| References | () https://git.kernel.org/stable/c/01db0e1a48345aa1937f3bdfc7c7108d03ebcf7e - Patch | |
| References | () https://git.kernel.org/stable/c/be8250786ca94952a19ce87f98ad9906448bc9ef - Patch | |
| References | () https://git.kernel.org/stable/c/dab2a13059a475b6392550f882276e170fe2fcff - Patch |
Information
Published : 2025-05-20 16:15
Updated : 2025-11-17 14:58
NVD link : CVE-2025-37908
Mitre link : CVE-2025-37908
CVE.ORG link : CVE-2025-37908
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-459
Incomplete Cleanup
