CVE-2025-38227
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.10.1 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| linux | linux_kernel | 5.10 |
| linux | linux_kernel | 5.10 |
| linux | linux_kernel | 5.10 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) bug in the Linux kernel's vidtv media driver. Specifically, after an initialization failure in the PSI (Program Specific Information) component, a member (si) is accessed again even though it has already been freed, leading to a slab-use-after-free condition. This occurs in the vidtv_mux_init function, and the proper fix is to terminate the subsequent process after the initialization failure to avoid accessing freed memory.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption due to use-after-free, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited. Since it occurs in the Linux kernel's media subsystem, it could affect systems using the vidtv driver, potentially compromising system security or reliability.