CVE-2025-38129
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) bug in the Linux kernel's page_pool subsystem, specifically in the function page_pool_recycle_in_ring. It occurs when the page pool is freed while it is still recycling the last page in its ring buffer, leading to a read of freed memory. This can cause kernel instability or crashes due to accessing invalid memory.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to kernel crashes or instability, potentially causing denial of service. In some cases, such vulnerabilities might be exploited to execute arbitrary code or escalate privileges, but the provided information does not specify such impacts.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the use-after-free in page_pool_recycle_in_ring by adding a producer-lock barrier to page_pool_release to prevent the page pool from being freed before all pages have been recycled. This involves updating the Linux kernel to a version that includes this fix.