CVE-2025-71162
BaseFortify
Publication date: 2026-01-25
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.13 (inc) to 6.18.7 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.67 (exc) |
| linux | linux_kernel | From 4.7 (inc) to 5.10.249 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Tegra ADMA driver of the Linux kernel. It occurs when audio streams are terminated, especially during XRUN conditions. The issue arises because the DMA buffer is freed before a scheduled tasklet finishes accessing it, leading to the tasklet accessing freed memory. This race condition happens when a DMA transfer completes and schedules a tasklet, then audio playback stops and frees the buffer, and finally the tasklet runs and accesses the freed buffer, causing a use-after-free error.
How can this vulnerability impact me? :
This vulnerability can cause system crashes or instability due to the use-after-free condition in the kernel's DMA engine driver. It may lead to kernel bugs, memory corruption, or unexpected behavior when audio streams are terminated, potentially affecting system reliability and security.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel crash logs for use-after-free errors related to the Tegra ADMA driver, specifically messages from KASAN (Kernel Address Sanitizer) indicating use-after-free in vchan_complete. You can check the kernel logs using commands like 'dmesg | grep -i kasan' or 'journalctl -k | grep -i kasan' to find relevant crash reports. There are no specific network detection commands since this is a kernel driver issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the Tegra ADMA driver use-after-free bug is fixed. The fix includes proper synchronization of the virtual channel completion by calling vchan_terminate_vdesc() in tegra_adma_stop() and adding tegra_adma_synchronize() to kill pending tasklets and free terminated descriptors. Until the patch is applied, avoid terminating audio streams abruptly during XRUN conditions to reduce the chance of triggering the race condition.