CVE-2025-38433
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's riscv architecture support for nommu kernels. The function __runtime_fixup_32 does not correctly handle the case when a value is zero, which can happen when patching a nommu kernel and referring to a physical address below 4GiB. The existing logic can cause two nop instructions to be emitted, leaving random garbage in a register that should hold the upper 32 bits of a pointer. This results in an invalid pointer that causes a kernel panic when accessed. The issue arises because the code does not fully follow through the logic needed when converting instructions to nops, leading to incorrect pointer values.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic due to invalid pointers being generated during runtime patching on riscv nommu kernels. This can lead to system crashes and instability, potentially causing downtime or loss of service on affected systems.