{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68253","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T13:41:40.266Z","datePublished":"2025-12-16T14:32:19.546Z","dateUpdated":"2026-05-11T21:49:47.693Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:49:47.693Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: don't spin in add_stack_record when gfp flags don't allow\n\nsyzbot was able to find the following path:\n  add_stack_record_to_list mm/page_owner.c:182 [inline]\n  inc_stack_record_count mm/page_owner.c:214 [inline]\n  __set_page_owner+0x2c3/0x4a0 mm/page_owner.c:333\n  set_page_owner include/linux/page_owner.h:32 [inline]\n  post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n  prep_new_page mm/page_alloc.c:1859 [inline]\n  get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n  alloc_pages_nolock_noprof+0x94/0x120 mm/page_alloc.c:7554\n\nDon't spin in add_stack_record_to_list() when it is called\nfrom *_nolock() context."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["mm/page_owner.c"],"versions":[{"version":"97769a53f117e2f33864c587d85992ee35194ecf","lessThan":"504174133453e3af73e626e328603d7eb5986f34","status":"affected","versionType":"git"},{"version":"97769a53f117e2f33864c587d85992ee35194ecf","lessThan":"c83aab85e18103a6dc066b4939e2c92a02bb1b05","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["mm/page_owner.c"],"versions":[{"version":"6.15","status":"affected"},{"version":"0","lessThan":"6.15","status":"unaffected","versionType":"semver"},{"version":"6.17.6","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.15","versionEndExcluding":"6.17.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.15","versionEndExcluding":"6.18"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/504174133453e3af73e626e328603d7eb5986f34"},{"url":"https://git.kernel.org/stable/c/c83aab85e18103a6dc066b4939e2c92a02bb1b05"}],"title":"mm: don't spin in add_stack_record when gfp flags don't allow","x_generator":{"engine":"bippy-1.2.0"}}}}