CVE-2025-38681 (GCVE-0-2025-38681)
Vulnerability from cvelistv5
Published
2025-09-04 15:32
Modified
2025-09-04 15:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()
Memory hot remove unmaps and tears down various kernel page table regions
as required. The ptdump code can race with concurrent modifications of
the kernel page tables. When leaf entries are modified concurrently, the
dump code may log stale or inconsistent information for a VA range, but
this is otherwise not harmful.
But when intermediate levels of kernel page table are freed, the dump code
will continue to use memory that has been freed and potentially
reallocated for another purpose. In such cases, the ptdump code may
dereference bogus addresses, leading to a number of potential problems.
To avoid the above mentioned race condition, platforms such as arm64,
riscv and s390 take memory hotplug lock, while dumping kernel page table
via the sysfs interface /sys/kernel/debug/kernel_page_tables.
Similar race condition exists while checking for pages that might have
been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages
which in turn calls ptdump_check_wx(). Instead of solving this race
condition again, let's just move the memory hotplug lock inside generic
ptdump_check_wx() which will benefit both the scenarios.
Drop get_online_mems() and put_online_mems() combination from all existing
platform ptdump code paths.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b Version: bbd6ec605c0fc286c3f8ce60b4ed44635361d58b |
||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/arm64/mm/ptdump_debugfs.c", "arch/riscv/mm/ptdump.c", "arch/s390/mm/dump_pagetables.c", "mm/ptdump.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "3ee9a8c27bfd72c3f465004fa8455785d61be5e8", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "69bea84b06b5e779627e7afdbf4b60a7d231c76f", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "ac25ec5fa2bf6e606dc7954488e4dded272fa9cd", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "1636b5e9c3543b87d673e32a47e7c18698882425", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "ff40839e018b82c4d756d035f34a63aa2d93be83", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "67995d4244694928ce701928e530b5b4adeb17b4", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "ca8c414499f2e5337a95a76be0d21b728ee31c6b", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" }, { "lessThan": "59305202c67fea50378dcad0cc199dbc13a0e99a", "status": "affected", "version": "bbd6ec605c0fc286c3f8ce60b4ed44635361d58b", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/arm64/mm/ptdump_debugfs.c", "arch/riscv/mm/ptdump.c", "arch/s390/mm/dump_pagetables.c", "mm/ptdump.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.7" }, { "lessThan": "5.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.241", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.190", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.149", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.103", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.43", "versionType": "semver" }, { "lessThanOrEqual": "6.15.*", "status": "unaffected", "version": "6.15.11", "versionType": "semver" }, { "lessThanOrEqual": "6.16.*", "status": "unaffected", "version": "6.16.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.17-rc1", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.241", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.190", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.149", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.103", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.43", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15.11", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.16.2", "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.17-rc1", "versionStartIncluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()\n\nMemory hot remove unmaps and tears down various kernel page table regions\nas required. The ptdump code can race with concurrent modifications of\nthe kernel page tables. When leaf entries are modified concurrently, the\ndump code may log stale or inconsistent information for a VA range, but\nthis is otherwise not harmful.\n\nBut when intermediate levels of kernel page table are freed, the dump code\nwill continue to use memory that has been freed and potentially\nreallocated for another purpose. In such cases, the ptdump code may\ndereference bogus addresses, leading to a number of potential problems.\n\nTo avoid the above mentioned race condition, platforms such as arm64,\nriscv and s390 take memory hotplug lock, while dumping kernel page table\nvia the sysfs interface /sys/kernel/debug/kernel_page_tables.\n\nSimilar race condition exists while checking for pages that might have\nbeen marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages\nwhich in turn calls ptdump_check_wx(). Instead of solving this race\ncondition again, let\u0027s just move the memory hotplug lock inside generic\nptdump_check_wx() which will benefit both the scenarios.\n\nDrop get_online_mems() and put_online_mems() combination from all existing\nplatform ptdump code paths." } ], "providerMetadata": { "dateUpdated": "2025-09-04T15:32:36.681Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8" }, { "url": "https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f" }, { "url": "https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd" }, { "url": "https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425" }, { "url": "https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83" }, { "url": "https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4" }, { "url": "https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b" }, { "url": "https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a" } ], "title": "mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38681", "datePublished": "2025-09-04T15:32:36.681Z", "dateReserved": "2025-04-16T04:51:24.031Z", "dateUpdated": "2025-09-04T15:32:36.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38681\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-04T16:15:35.747\",\"lastModified\":\"2025-09-05T17:47:24.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()\\n\\nMemory hot remove unmaps and tears down various kernel page table regions\\nas required. The ptdump code can race with concurrent modifications of\\nthe kernel page tables. When leaf entries are modified concurrently, the\\ndump code may log stale or inconsistent information for a VA range, but\\nthis is otherwise not harmful.\\n\\nBut when intermediate levels of kernel page table are freed, the dump code\\nwill continue to use memory that has been freed and potentially\\nreallocated for another purpose. In such cases, the ptdump code may\\ndereference bogus addresses, leading to a number of potential problems.\\n\\nTo avoid the above mentioned race condition, platforms such as arm64,\\nriscv and s390 take memory hotplug lock, while dumping kernel page table\\nvia the sysfs interface /sys/kernel/debug/kernel_page_tables.\\n\\nSimilar race condition exists while checking for pages that might have\\nbeen marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages\\nwhich in turn calls ptdump_check_wx(). Instead of solving this race\\ncondition again, let\u0027s just move the memory hotplug lock inside generic\\nptdump_check_wx() which will benefit both the scenarios.\\n\\nDrop get_online_mems() and put_online_mems() combination from all existing\\nplatform ptdump code paths.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…