CVE-2025-38372
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves unsafe access to an xarray data structure in the RDMA mlx5 driver during implicit On-Demand Paging (ODP) handling. Specifically, the functions __xa_store() and __xa_erase() were used without holding the proper lock, leading to unsafe Read-Copy-Update (RCU) usage and lockdep warnings. The fix replaces these calls with xa_store() and xa_erase(), which handle locking internally to ensure safe concurrent access.
How can this vulnerability impact me? :
The vulnerability could lead to unsafe concurrent access in the kernel's RDMA mlx5 driver, potentially causing kernel instability, crashes, or data corruption due to improper locking and RCU usage. This may affect systems relying on RDMA functionality with the mlx5 driver, impacting system reliability and performance.