CVE-2025-38412
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | wmi-sysman | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of WMI (Windows Management Instrumentation) data blocks in sysfs callbacks on x86 platforms, specifically related to the dell-wmi-sysman component. The issue was that after retrieving WMI data blocks, the kernel did not properly check their validity before accessing their content, which could lead to improper behavior or crashes. The fix ensures that the validity of these data blocks is verified before they are dereferenced.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause system instability or crashes due to invalid memory access when the kernel dereferences invalid WMI data blocks. This could potentially affect system reliability on affected Linux systems using the dell-wmi-sysman component on x86 platforms.