CVE-2025-38074
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.10.240 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.189 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.146 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.93 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.31 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.9 (exc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's vhost-scsi component involves improper protection of the vq->log_used variable with the vq->mutex. The issue arises because the vhost-scsi completion path may access vq->log_base after vq->log_used has been set to false without proper synchronization. Since vq->log_base is memory from QEMU userspace that can be freed (reclaimed) via gfree(), this leads to invalid memory writes to QEMU userspace, potentially causing memory corruption or crashes.
How can this vulnerability impact me? :
This vulnerability can cause invalid memory writes to QEMU userspace, which may lead to memory corruption, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service within the virtual machine environment that uses vhost-scsi with QEMU.