CVE-2025-68299

Source
https://cve.org/CVERecord?id=CVE-2025-68299
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68299.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68299
Downstream
Published
2025-12-16T15:06:18.246Z
Modified
2026-03-09T23:58:15.156444Z
Summary
afs: Fix delayed allocation of a cell's anonymous key
Details

In the Linux kernel, the following vulnerability has been resolved:

afs: Fix delayed allocation of a cell's anonymous key

The allocation of a cell's anonymous key is done in a background thread along with other cell setup such as doing a DNS upcall. In the reported bug, this is triggered by afsparsesource() parsing the device name given to mount() and calling afslookupcell() with the name of the cell.

The normal key lookup then tries to use the key description on the anonymous authentication key as the reference for request_key() - but it may not yet be set and so an oops can happen.

This has been made more likely to happen by the fix for dynamic lookup failure.

Fix this by firstly allocating a reference name and attaching it to the afscell record when the record is created. It can share the memory allocation with the cell name (unfortunately it can't just overlap the cell name by prepending it with "afs@" as the cell name already has a '.' prepended for other purposes). This reference name is then passed to requestkey().

Secondly, the anon key is now allocated on demand at the point a key is requested in afsrequestkey() if it is not already allocated. A mutex is used to prevent multiple allocation for a cell.

Thirdly, make afsrequestkeyrcu() return NULL if the anonymous key isn't yet allocated (if we need it) and then the caller can return -ECHILD to drop out of RCU-mode and afsrequest_key() can be called.

Note that the anonymous key is kind of necessary to make the key lookup cache work as that doesn't currently cache a negative lookup, but it's probably worth some investigation to see if NULL can be used instead.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68299.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7e33b15d5a6578a99ebf189cea34983270ae92dd
Fixed
5613bde937dfac6725e9c3fc766b9d6b8481e55b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
330e2c514823008b22e6afd2055715bc46dd8d55
Fixed
d27c71257825dced46104eefe42e4d9964bd032e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68299.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.17.9
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68299.json"