CVE-2025-38140
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's device mapper (dm) relates to how it handles swapping tables for devices with zone write plugs. Specifically, when a device already has zone write plug resources, the function blk_revalidate_disk_zones() does not correctly update the zoned settings if called for arbitrary zoned device changes. This can cause mismatches in zone settings and errors such as reading invalid memory. The fix involves disallowing table reloads that change zoned settings for devices with zone plug resources, restricting changes to only switching to another zoned table that emulates zone append without changing device or zone size.
How can this vulnerability impact me? :
This vulnerability can cause errors in devices with zone write plug resources, such as reading invalid memory, which may lead to device malfunctions or data corruption. It affects the reliability and correctness of zoned block device operations, potentially impacting system stability and data integrity when using such devices.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid reloading device-mapper tables that change zoned settings on devices with zone write plug resources. Specifically, ensure that devices with zone write plug resources only switch to another zoned table that also emulates zone append, and do not change the device size or zone size. Alternatively, a device can switch to an error target. These steps prevent incorrect updates to zone write plug resources and avoid errors related to invalid memory reads.