VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68212

CVE-2025-68212

Description

In the Linux kernel, the following vulnerability has been resolved:

fs: Fix uninitialized 'offp' in statmount_string()

In statmount_string(), most flags assign an output offset pointer (offp) which is later updated with the string offset. However, the STATMOUNT_MNT_UIDMAP and STATMOUNT_MNT_GIDMAP cases directly set the struct fields instead of using offp. This leaves offp uninitialized, leading to a possible uninitialized dereference when *offp is updated.

Fix it by assigning offp for UIDMAP and GIDMAP as well, keeping the code path consistent.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, statmount_string() leaves offp uninitialized for UIDMAP/GIDMAP flags, causing a potential uninitialized dereference.

Vulnerability

Analysis

In the Linux kernel's statmount_string() function, most flag cases assign an output offset pointer (offp) which is later updated with the string offset. However, the STATMOUNT_MNT_UIDMAP and STATMOUNT_MNT_GIDMAP cases directly set struct fields instead of using offp, leaving offp uninitialized. This leads to a possible uninitialized dereference when *offp is updated later in the function [1].

Exploitation

An attacker could potentially trigger this vulnerability by invoking a system call that uses statmount_string() with the UIDMAP or GIDMAP flags. The uninitialized offp pointer may point to arbitrary kernel memory, and the subsequent write to *offp could corrupt kernel data or cause a crash. No authentication is required if the attacker can make the relevant system call from userspace.

Impact

Successful exploitation could lead to kernel memory corruption, denial of service (system crash), or potentially privilege escalation if the attacker can be achieved if the attacker can control the uninitialized pointer value. The vulnerability is fixed by assigning offp for UIDMAP and GIDMAP cases, making the code path consistent with other flags [1].

Mitigation

The fix has been applied in the Linux kernel stable tree as commit 0778ac7df5137d5041783fadfc201f8fd55a1d9b [1]. Users should update their kernels to include this patch. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.