{"id":"CVE-2025-68179","summary":"s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP\n\nAs reported by Luiz Capitulino enabling HVO on s390 leads to reproducible\ncrashes. The problem is that kernel page tables are modified without\nflushing corresponding TLB entries.\n\nEven if it looks like the empty flush_tlb_all() implementation on s390 is\nthe problem, it is actually a different problem: on s390 it is not allowed\nto replace an active/valid page table entry with another valid page table\nentry without the detour over an invalid entry. A direct replacement may\nlead to random crashes and/or data corruption.\n\nIn order to invalidate an entry special instructions have to be used\n(e.g. ipte or idte). Alternatively there are also special instructions\navailable which allow to replace a valid entry with a different valid\nentry (e.g. crdte or cspg).\n\nGiven that the HVO code currently does not provide the hooks to allow for\nan implementation which is compliant with the s390 architecture\nrequirements, disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP again, which is\nbasically a revert of the original patch which enabled it.","modified":"2026-03-20T12:46:16.164729Z","published":"2025-12-16T13:42:57.817Z","related":["MGASA-2026-0017","MGASA-2026-0018"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68179.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5e23918e4352288323d13fb511116cdea0234b71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64e2f60f355e556337fcffe80b9bcff1b22c9c42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7088465f10816d9425b95740b37c95f082041d76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4a8238e5729505b7394ccb007e5dc3e557aa66b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68179.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68179"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"00a34d5a99c0631bd780b14cbe3813d0b39c3886"},{"fixed":"7088465f10816d9425b95740b37c95f082041d76"},{"fixed":"5e23918e4352288323d13fb511116cdea0234b71"},{"fixed":"d4a8238e5729505b7394ccb007e5dc3e557aa66b"},{"fixed":"64e2f60f355e556337fcffe80b9bcff1b22c9c42"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68179.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.58"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68179.json"}}],"schema_version":"1.7.5"}