CVE-2025-38158
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.18 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's hisi_acc_vfio_pci component, where there was an error in combining data read from hardware registers into DMA addresses for EQE and AEQE. This caused incorrect DMA addresses after migration, leading to failures in guest kernel-mode encryption services. The fix involved correcting the address combination sequence and updating DMA addresses when an old magic number is detected during migration to ensure correctness.
How can this vulnerability impact me? :
The vulnerability can cause guest kernel-mode encryption services to fail due to incorrect DMA addresses after migration. This could lead to disruptions or failures in encryption operations within virtualized environments using the affected Linux kernel component.