CVE-2025-71110
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
14/01/2026
Last modified:
25/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/slub: reset KASAN tag in defer_free() before accessing freed memory<br />
<br />
When CONFIG_SLUB_TINY is enabled, kfree_nolock() calls kasan_slab_free()<br />
before defer_free(). On ARM64 with MTE (Memory Tagging Extension),<br />
kasan_slab_free() poisons the memory and changes the tag from the<br />
original (e.g., 0xf3) to a poison tag (0xfe).<br />
<br />
When defer_free() then tries to write to the freed object to build the<br />
deferred free list via llist_add(), the pointer still has the old tag,<br />
causing a tag mismatch and triggering a KASAN use-after-free report:<br />
<br />
BUG: KASAN: slab-use-after-free in defer_free+0x3c/0xbc mm/slub.c:6537<br />
Write at addr f3f000000854f020 by task kworker/u8:6/983<br />
Pointer tag: [f3], memory tag: [fe]<br />
<br />
Fix this by calling kasan_reset_tag() before accessing the freed memory.<br />
This is safe because defer_free() is part of the allocator itself and is<br />
expected to manipulate freed memory for bookkeeping purposes.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.18.1 (including) | 6.18.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



