CVE-2025-38084
BaseFortify
Publication date: 2025-06-28
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.20 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the timing of unsharing huge page tables during virtual memory area (VMA) splitting. The unsharing was triggered too early, before necessary locks were acquired, which allowed race conditions where page tables could be shared again improperly. The fix moves the unsharing to occur after acquiring the appropriate locks, preventing these race conditions and ensuring proper isolation of page tables during VMA splits.
How can this vulnerability impact me? :
This vulnerability can lead to race conditions in memory management, potentially causing page tables to be shared incorrectly between processes. This could result in memory corruption, data leakage, or instability in the system, impacting the security and reliability of applications running on the affected Linux kernel.