CVE-2025-38681
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a race condition in the Linux kernel's ptdump code, which is responsible for dumping kernel page tables. When intermediate levels of kernel page tables are freed during memory hot removal, the ptdump code may continue to use memory that has been freed and possibly reallocated for other purposes. This can cause the code to dereference invalid addresses, potentially leading to various problems. The issue arises because the ptdump code does not properly take the memory hotplug lock during these operations, allowing concurrent modifications to cause inconsistent or stale data to be logged or invalid memory accesses.
How can this vulnerability impact me? :
The vulnerability can lead to the ptdump code dereferencing invalid or freed memory addresses, which may cause system instability, crashes, or other unpredictable behavior in the Linux kernel. Although some race conditions only result in stale or inconsistent information being logged, the more severe case of using freed memory can cause more serious issues affecting system reliability and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix where the memory hotplug lock is taken inside ptdump_walk_pgd() and ptdump_check_wx(). This prevents race conditions during kernel page table dumping and checking. Avoid using the /sys/kernel/debug/kernel_page_tables interface on affected platforms until the kernel is updated.