CVE-2025-38383
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race condition in the Linux kernel's show_numa_info() function within the vmalloc subsystem. It occurs because a shared variable (m->private) is accessed concurrently by multiple CPUs without proper synchronization, leading to simultaneous read and write operations. This can cause inconsistent or corrupted data to be read or written during the execution of vmalloc_info_show(). The fix involved changing the allocation strategy to ensure the heap is allocated within vmalloc_info_show() itself, preventing concurrent access issues.
How can this vulnerability impact me? :
This data race vulnerability can lead to inconsistent or corrupted information being reported by the show_numa_info() function, which may affect system stability or reliability when querying NUMA-related memory information. While the direct impact on system security or data confidentiality is not explicitly stated, data races can potentially cause unpredictable behavior or crashes in the kernel, which could affect system availability.