CVE-2025-38100
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a flaw in the Linux kernel's handling of IO bitmap flags during task cleanup, specifically in the x86 architecture. When a task exits or a fork operation fails, the kernel calls functions to clean up IO bitmap resources. However, if the cleanup function operates on a task that is not the current task, or if a task has inconsistent IO bitmap flags (TIF_IO_BITMAP set but no bitmap installed), it can cause a NULL pointer dereference and crash the system. The issue arises because the kernel incorrectly invokes task_update_io_bitmap() during cleanup of non-current tasks and does not clear TIF_IO_BITMAP flags properly during thread copying. The fix involves preventing the cleanup function from updating IO bitmaps for non-current tasks and clearing the TIF_IO_BITMAP flag unconditionally during thread copying to maintain consistent state.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when handling IO bitmap flags during task cleanup. Such crashes can lead to system instability, denial of service, or unexpected reboots, impacting the availability and reliability of systems running vulnerable kernel versions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by kernel code changes that prevent improper invocation of task_update_io_bitmap() and clear TIF_IO_BITMAP flags unconditionally during thread copying. To mitigate this vulnerability, you should update your Linux kernel to a version that includes these fixes. There are no specific immediate configuration changes or commands mentioned to mitigate this vulnerability without updating the kernel.