CVE-2025-38419
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's remote processor (remoteproc) core. When attaching to a remote processor using rproc_attach(), if the function rproc_handle_resources() fails, the resources allocated by imx_rproc_prepare() are not properly released. This happens when the remote processor state is RPROC_DETACHED. The issue is due to incorrect handling of cleanup in the code, specifically the use of 'goto' statements that skip resource cleanup, leading to unreleased memory.
How can this vulnerability impact me? :
The impact of this vulnerability is a memory leak in the Linux kernel when attaching to a remote processor. Over time, this can lead to increased memory usage and potentially exhaust system memory, causing degraded system performance or crashes. This can affect system stability and reliability, especially in environments that frequently attach and detach remote processors.