CVE-2025-38334
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (inc) |
| debian | debian_linux | 11.0 |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of SGX (Software Guard Extensions) enclave pages. Specifically, the kernel attempts to reclaim 'poisoned' EPC (Enclave Page Cache) pages, which are pages marked as faulty due to memory errors. The reclaim process uses SGX microcode operations that cannot properly handle machine check exceptions (MCEs) caused by these poisoned pages. Attempting to reclaim such pages can cause a CPU core to shut down and lead to a kernel panic. The fix prevents the kernel from trying to reclaim these poisoned pages by removing them from the active reclaim list, avoiding system crashes and potential security issues.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability can cause a system crash (kernel panic) due to the kernel attempting to reclaim poisoned SGX enclave pages. This can lead to denial of service as the affected CPU core shuts down and the kernel panics, potentially disrupting services or applications relying on SGX enclaves. Additionally, there is a risk that poisoned pages could be incorrectly reused in other enclaves, which may compromise enclave integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Linux kernel is updated to a version that includes the fix preventing attempts to reclaim poisoned SGX EPC pages. Specifically, the fix involves calling sgx_unmark_page_reclaimable() on memory errors to remove poisoned pages from the sgx_active_page_list, preventing their reclaim and avoiding kernel panic. Applying the latest kernel patches addressing this issue is the immediate recommended step.