CVE-2025-38456
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's IPMI message handler involves a potential memory corruption issue in the function ipmi_create_user(). Specifically, the 'intf' list iterator can become an invalid pointer if the correct 'intf->intf_num' is not found. Calling atomic_dec(&intf->nr_users) on this invalid pointer leads to memory corruption. The fix involves avoiding the call to atomic_dec() if atomic_add_return() was not previously called, particularly updating the if (intf->in_shutdown) path.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.