CVE-2025-38284
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's wifi driver 'rtw89' for PCI devices. It relates to how the driver configures manual DAC mode via the PCI configuration API to support 36-bit DMA addressing. Because the PCI device memory mapping (mmap) isn't properly set and the DBI interface is inaccessible via mmap, the chip can only support 36-bit DMA if the bit is accessible via the PCI config API; otherwise, it falls back to 32-bit DMA. This improper handling can cause the kernel to throw a page fault and crash (kernel oops) due to a NULL mmap address access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) when the wifi driver attempts to access an invalid memory address due to improper configuration of DMA addressing. This can lead to system instability, potential denial of service, and unexpected reboots or interruptions in wifi functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for kernel crash logs or oops messages related to the rtw89_pci driver, specifically looking for the trace involving 'BUG: unable to handle page fault for address: 0000000000001090' and 'rtw89_pci_ops_write16'. You can search the system logs using commands like 'dmesg | grep rtw89_pci' or 'journalctl -k | grep rtw89_pci' to find relevant error messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the issue is resolved, as the fix involves configuring manual DAC mode via the PCI config API only. Until then, avoid using affected hardware or drivers that trigger the bug, and monitor system logs for the described kernel oops to prevent system crashes.