CVE-2025-38687
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's comedi subsystem. It occurs because the comedi driver removes the allocated asynchronous area even though there are still active poll requests on the wait queue inside it. When these poll entries are later triggered or removed, they reference memory that has already been freed, causing a use-after-free condition. The fix involves ensuring no tasks are queued on any subdevice wait queues before allowing the device to be detached, by properly locking mechanisms during device detachment.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the freed memory being accessed improperly.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version that includes the fix for the race condition between polling and detaching in the comedi driver. This fix involves ensuring that the device's attach_lock is write-locked before detaching the device to prevent use-after-free conditions. Applying the patch or upgrading to a kernel version that contains this patch will mitigate the issue.