CVE-2025-38062
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.2 (inc) to 6.1.141 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.93 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.31 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.9 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a use-after-free (UAF) issue in the Linux kernel's handling of MSI (Message Signaled Interrupts) translation with IOMMU (Input-Output Memory Management Unit). Specifically, a pointer (cookie) stored during MSI interrupt allocation can become invalid between two steps of MSI message address translation due to lack of locking and changes in the IOMMU domain during VFIO operation. This can lead to unsafe memory access. The fix involves storing the translated IOVA address directly as an integer instead of a pointer to avoid the UAF.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the kernel, potentially causing system instability, crashes, or security issues such as privilege escalation or arbitrary code execution if exploited. It affects systems using VFIO with iommufd where the IOMMU domain can be changed during operation, allowing a race condition that triggers the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the MSI cookie use-after-free (UAF) by storing the translated IOVA address directly as an integer in the MSI descriptor instead of a cookie pointer. Additionally, ensure that the kernel version includes the fix that prevents the race condition by using proper locking mechanisms such as the IOMMU group mutex. Avoid changing the iommu domain during VFIO operation until the patch is applied.