VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68253

CVE-2025-68253

Description

In the Linux kernel, the following vulnerability has been resolved:

mm: don't spin in add_stack_record when gfp flags don't allow

syzbot was able to find the following path: add_stack_record_to_list mm/page_owner.c:182 [inline] inc_stack_record_count mm/page_owner.c:214 [inline] __set_page_owner+0x2c3/0x4a0 mm/page_owner.c:333 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851 prep_new_page mm/page_alloc.c:1859 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858 alloc_pages_nolock_noprof+0x94/0x120 mm/page_alloc.c:7554

Don't spin in add_stack_record_to_list() when it is called from *_nolock() context.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A spinlock deadlock in Linux kernel's page_owner when called from atomic context, fixed by not spinning in add_stack_record_to_list.

Vulnerability

In the Linux kernel, the add_stack_record_to_list() function in mm/page_owner.c could spin indefinitely when called from a context that does not allow sleeping or spinning, such as *_nolock() allocator paths. This occurs because inc_stack_record_count() invokes add_stack_record_to_list() which tries to acquire a spinlock without checking whether the current context permits blocking, leading to potential deadlocks or hangs [1].

Exploitation

The vulnerability is triggered during page allocation when __set_page_owner() is called from post_alloc_hook(), which itself is invoked via the alloc_pages_nolock_noprof() path. An attacker would need to be able to trigger memory allocation in such a way that the page allocation occurs from an atomic or non-sleepable context, potentially through crafted system calls or by exploiting other subsystems that lead to this code path [1].

Impact

If exploited, an attacker could cause a denial-of-service condition by causing the kernel to hang or deadlock, as the spinlock acquisition in add_stack_record_to_list() will never succeed if the lock is held and the context cannot wait. This can result in system unresponsiveness or crash [1].

Mitigation

The fix, included in Linux kernel stable commits, ensures that add_stack_record_to_list() does not spin when the GFP flags indicate that sleeping or spinning is not allowed. Users should apply the latest kernel updates from their distribution or the mainline kernel to address this issue [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.