CVE-2025-38681 (GCVE-0-2025-38681)
Vulnerability from cvelistv5
Published
2025-09-04 15:32
Modified
2025-09-04 15:32
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() Memory hot remove unmaps and tears down various kernel page table regions as required. The ptdump code can race with concurrent modifications of the kernel page tables. When leaf entries are modified concurrently, the dump code may log stale or inconsistent information for a VA range, but this is otherwise not harmful. But when intermediate levels of kernel page table are freed, the dump code will continue to use memory that has been freed and potentially reallocated for another purpose. In such cases, the ptdump code may dereference bogus addresses, leading to a number of potential problems. To avoid the above mentioned race condition, platforms such as arm64, riscv and s390 take memory hotplug lock, while dumping kernel page table via the sysfs interface /sys/kernel/debug/kernel_page_tables. Similar race condition exists while checking for pages that might have been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages which in turn calls ptdump_check_wx(). Instead of solving this race condition again, let's just move the memory hotplug lock inside generic ptdump_check_wx() which will benefit both the scenarios. Drop get_online_mems() and put_online_mems() combination from all existing platform ptdump code paths.
Impacted products
Vendor Product Version
Linux Linux Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b
Create a notification for this product.
   Linux Linux Version: 5.7
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "arch/arm64/mm/ptdump_debugfs.c",
            "arch/riscv/mm/ptdump.c",
            "arch/s390/mm/dump_pagetables.c",
            "mm/ptdump.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3ee9a8c27bfd72c3f465004fa8455785d61be5e8",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "69bea84b06b5e779627e7afdbf4b60a7d231c76f",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "ac25ec5fa2bf6e606dc7954488e4dded272fa9cd",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "1636b5e9c3543b87d673e32a47e7c18698882425",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "ff40839e018b82c4d756d035f34a63aa2d93be83",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "67995d4244694928ce701928e530b5b4adeb17b4",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "ca8c414499f2e5337a95a76be0d21b728ee31c6b",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            },
            {
              "lessThan": "59305202c67fea50378dcad0cc199dbc13a0e99a",
              "status": "affected",
              "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "arch/arm64/mm/ptdump_debugfs.c",
            "arch/riscv/mm/ptdump.c",
            "arch/s390/mm/dump_pagetables.c",
            "mm/ptdump.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.7"
            },
            {
              "lessThan": "5.7",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.241",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.190",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.149",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.103",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.43",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.241",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.190",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.149",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.103",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.43",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.11",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.2",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17-rc1",
                  "versionStartIncluding": "5.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()\n\nMemory hot remove unmaps and tears down various kernel page table regions\nas required.  The ptdump code can race with concurrent modifications of\nthe kernel page tables.  When leaf entries are modified concurrently, the\ndump code may log stale or inconsistent information for a VA range, but\nthis is otherwise not harmful.\n\nBut when intermediate levels of kernel page table are freed, the dump code\nwill continue to use memory that has been freed and potentially\nreallocated for another purpose.  In such cases, the ptdump code may\ndereference bogus addresses, leading to a number of potential problems.\n\nTo avoid the above mentioned race condition, platforms such as arm64,\nriscv and s390 take memory hotplug lock, while dumping kernel page table\nvia the sysfs interface /sys/kernel/debug/kernel_page_tables.\n\nSimilar race condition exists while checking for pages that might have\nbeen marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages\nwhich in turn calls ptdump_check_wx().  Instead of solving this race\ncondition again, let\u0027s just move the memory hotplug lock inside generic\nptdump_check_wx() which will benefit both the scenarios.\n\nDrop get_online_mems() and put_online_mems() combination from all existing\nplatform ptdump code paths."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-04T15:32:36.681Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8"
        },
        {
          "url": "https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f"
        },
        {
          "url": "https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd"
        },
        {
          "url": "https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425"
        },
        {
          "url": "https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83"
        },
        {
          "url": "https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4"
        },
        {
          "url": "https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b"
        },
        {
          "url": "https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a"
        }
      ],
      "title": "mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38681",
    "datePublished": "2025-09-04T15:32:36.681Z",
    "dateReserved": "2025-04-16T04:51:24.031Z",
    "dateUpdated": "2025-09-04T15:32:36.681Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38681\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-04T16:15:35.747\",\"lastModified\":\"2025-09-05T17:47:24.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()\\n\\nMemory hot remove unmaps and tears down various kernel page table regions\\nas required.  The ptdump code can race with concurrent modifications of\\nthe kernel page tables.  When leaf entries are modified concurrently, the\\ndump code may log stale or inconsistent information for a VA range, but\\nthis is otherwise not harmful.\\n\\nBut when intermediate levels of kernel page table are freed, the dump code\\nwill continue to use memory that has been freed and potentially\\nreallocated for another purpose.  In such cases, the ptdump code may\\ndereference bogus addresses, leading to a number of potential problems.\\n\\nTo avoid the above mentioned race condition, platforms such as arm64,\\nriscv and s390 take memory hotplug lock, while dumping kernel page table\\nvia the sysfs interface /sys/kernel/debug/kernel_page_tables.\\n\\nSimilar race condition exists while checking for pages that might have\\nbeen marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages\\nwhich in turn calls ptdump_check_wx().  Instead of solving this race\\ncondition again, let\u0027s just move the memory hotplug lock inside generic\\nptdump_check_wx() which will benefit both the scenarios.\\n\\nDrop get_online_mems() and put_online_mems() combination from all existing\\nplatform ptdump code paths.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…