CVE-2025-38256
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's io_uring subsystem improperly unpinning pages of memory. Specifically, it pins a tail page of a folio but then tries to unpin the head page, which is incorrect and triggers a debug warning or kernel bug. The fix involves using the correct function to unpin the entire folio rather than individual pages, preventing internal errors and kernel crashes.
How can this vulnerability impact me? :
This vulnerability can cause kernel bugs and internal errors, potentially leading to system instability or crashes when using io_uring. This could affect the reliability and availability of systems running vulnerable Linux kernels.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel BUG messages related to io_uring and folio unpinning failures. Specifically, look for messages similar to: 'kernel BUG at mm/gup.c:71!' or 'Internal error: Oops - BUG: ...' involving io_uring workqueue and unpin_user_page calls. You can use the command 'dmesg | grep -i "kernel BUG"' or 'journalctl -k | grep -i "io_uring"' to find such errors in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the vulnerability is fixed by using unpin_user_folio() instead of unpin_user_page* in the io_uring resource handling code. Until an update is applied, monitoring for the described kernel BUG messages and avoiding workloads that trigger io_uring folio unpinning can reduce exposure.