Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-68761— hfs: fix potential use after free in hfs_correct_next_unused_CNID()

EPSS 0.03% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-68761

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
hfs: fix potential use after free in hfs_correct_next_unused_CNID()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: hfs: fix potential use after free in hfs_correct_next_unused_CNID() This code calls hfs_bnode_put(node) which drops the refcount and then dreferences "node" on the next line. It's only safe to use "node" when we're holding a reference so flip these two lines around.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于hfs文件系统中hfs_correct_next_unused_CNID函数调用hfs_bnode_put后仍引用节点,可能导致释放后重用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux a06ec283e125e334155fe13005c76c9f484ce759 ~ 40a1e0142096dd7dd6cb5373841222b528698588 -
LinuxLinux 6.18 -

II. Public POCs for CVE-2025-68761

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-68761

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-01-05 · 16 CVEs total

CVE-2025-68752iavf: Implement settime64 with -EOPNOTSUPP
CVE-2025-68751s390/fpu: Fix false-positive kmsan report in fpu_vstl()
CVE-2025-68753ALSA: firewire-motu: add bounds check in put_user loop for DSP events
CVE-2025-68754rtc: amlogic-a4: fix double free caused by devm
CVE-2025-68755staging: most: remove broken i2c driver
CVE-2025-68756block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
CVE-2025-68757drm/vgem-fence: Fix potential deadlock on release
CVE-2025-68758backlight: led-bl: Add devlink to supplier LEDs
CVE-2025-68759wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
CVE-2025-68760iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show
CVE-2025-68762net: netpoll: initialize work queue before error checks
CVE-2025-68763crypto: starfive - Correctly handle return of sg_nents_for_len
CVE-2025-68765mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
CVE-2025-68764NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
CVE-2025-68766irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()

IV. Related Vulnerabilities

V. Comments for CVE-2025-68761

No comments yet


Leave a comment