CVE-2025-68366 Affecting kernel-uek-doc package, versions <0:6.12.0-108.64.6.3.el9uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE9-KERNELUEKDOC-15336040
  • published24 Feb 2026
  • disclosed24 Dec 2025

Introduced: 24 Dec 2025

CVE-2025-68366  (opens in a new tab)

How to fix?

Upgrade Oracle:9 kernel-uek-doc to version 0:6.12.0-108.64.6.3.el9uek or higher.
This issue was patched in ELSA-2026-50112.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-doc package and not the kernel-uek-doc package as distributed by Oracle. See How to fix? for Oracle:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config unlock in nbd_genl_connect

There is one use-after-free warning when running NBD_CMD_CONNECT and NBD_CLEAR_SOCK:

nbd_genl_connect nbd_alloc_and_init_config // config_refs=1 nbd_start_device // config_refs=2 set NBD_RT_HAS_CONFIG_REF open nbd // config_refs=3 recv_work done // config_refs=2 NBD_CLEAR_SOCK // config_refs=1 close nbd // config_refs=0 refcount_inc -> uaf

------------[ cut here ]------------ refcount_t: addition on 0; use-after-free. WARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290 nbd_genl_connect+0x16d0/0x1ab0 genl_family_rcv_msg_doit+0x1f3/0x310 genl_rcv_msg+0x44a/0x790

The issue can be easily reproduced by adding a small delay before refcount_inc(&nbd->config_refs) in nbd_genl_connect():

    mutex_unlock(&amp;nbd-&gt;config_lock);
    if (!ret) {
            set_bit(NBD_RT_HAS_CONFIG_REF, &amp;config-&gt;runtime_flags);
  •           printk(&#34;before sleep\n&#34;);
    
  •           mdelay(5 * 1000);
    
  •           printk(&#34;after sleep\n&#34;);
              refcount_inc(&amp;nbd-&gt;config_refs);
              nbd_connect_reply(info, nbd-&gt;index);
      }
    

CVSS Base Scores

version 3.1