CVE-2025-38453
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that defers freeing io_kiocb requests using RCU by adding an rcu_head and using kfree_rcu() in the io_uring/msg_ring code, specifically in io_msg_tw_complete() and other relevant spots. This ensures safe freeing of requests and prevents use-after-free issues reported by KASAN.
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's io_uring subsystem, specifically the msg_ring component. It occurs because requests in msg_ring are allocated and freed independently, which can lead to a situation where a request is freed too early and then accessed again, causing use-after-free errors. The fix defers the freeing of these requests using RCU (Read-Copy-Update) mechanisms to ensure that memory is not freed while still in use, preventing potential crashes or memory corruption.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the Linux kernel's io_uring subsystem, which may cause system instability, crashes, or memory corruption. Such issues could potentially be exploited to cause denial of service or other unintended behavior in systems using affected kernel versions.