In the Linux kernel, the following vulnerability has been resolved:
vhost-scsi: protect vq->log_used with vq->mutex
The vhost-scsi completion path may access vq->log_base when vq->log_used is
already set to false.
vhost-thread QEMU-thread
vhost_scsi_complete_cmd_work()
-> vhost_add_used()
-> vhost_add_used_n()
if (unlikely(vq->log_used))
QEMU disables vq->log_used
via VHOST_SET_VRING_ADDR.
mutex_lock(&vq->mutex);
vq->log_used = false now!
mutex_unlock(&vq->mutex);
QEMU gfree(vq->log_base)
log_used()
-> log_write(vq->log_base)
Assuming the VMM is QEMU. The vq->log_base is from QEMU userpace and can be
reclaimed via gfree(). As a result, this causes invalid memory writes to
QEMU userspace.
The control queue path has the same issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/59614c5acf6688f7af3c245d359082c0e9e53117 - Patch | |
| References | () https://git.kernel.org/stable/c/80cf68489681c165ded460930e391b1eb37b5f6f - Patch | |
| References | () https://git.kernel.org/stable/c/8312a1ccff1566f375191a89b9ba71b6eb48a8cd - Patch | |
| References | () https://git.kernel.org/stable/c/bd8c9404e44adb9f6219c09b3409a61ab7ce3427 - Patch | |
| References | () https://git.kernel.org/stable/c/c0039e3afda29be469d29b3013d7f9bdee136834 - Patch | |
| References | () https://git.kernel.org/stable/c/ca85c2d0db5f8309832be45858b960d933c2131c - Patch | |
| References | () https://git.kernel.org/stable/c/f591cf9fce724e5075cc67488c43c6e39e8cbe27 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
17 Jul 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
18 Jun 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 10:15
Updated : 2025-12-17 18:54
NVD link : CVE-2025-38074
Mitre link : CVE-2025-38074
CVE.ORG link : CVE-2025-38074
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
