CVE-2025-38418

In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Release rproc->clean_table after rproc_attach() fails When rproc->state = RPROC_DETACHED is attached to remote processor through rproc_attach(), if rproc_handle_resources() returns failure, then the clean table should be released, otherwise the following memory leak will occur. unreferenced object 0xffff000086a99800 (size 1024): comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s) hex dump (first 32 bytes): 00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............ 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............ backtrace: [<000000008bbe4ca8>] slab_post_alloc_hook+0x98/0x3fc [<000000003b8a272b>] __kmem_cache_alloc_node+0x13c/0x230 [<000000007a507c51>] __kmalloc_node_track_caller+0x5c/0x260 [<0000000037818dae>] kmemdup+0x34/0x60 [<00000000610f7f57>] rproc_boot+0x35c/0x56c [<0000000065f8871a>] rproc_add+0x124/0x17c [<00000000497416ee>] imx_rproc_probe+0x4ec/0x5d4 [<000000003bcaa37d>] platform_probe+0x68/0xd8 [<00000000771577f9>] really_probe+0x110/0x27c [<00000000531fea59>] __driver_probe_device+0x78/0x12c [<0000000080036a04>] driver_probe_device+0x3c/0x118 [<000000007e0bddcb>] __device_attach_driver+0xb8/0xf8 [<000000000cf1fa33>] bus_for_each_drv+0x84/0xe4 [<000000001a53b53e>] __device_attach+0xfc/0x18c [<00000000d1a2a32c>] device_initial_probe+0x14/0x20 [<00000000d8f8b7ae>] bus_probe_device+0xb0/0xb4 unreferenced object 0xffff0000864c9690 (size 16):
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

23 Dec 2025, 18:42

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
References () https://git.kernel.org/stable/c/3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c - () https://git.kernel.org/stable/c/3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c - Patch
References () https://git.kernel.org/stable/c/3ee979709e16a83b257bc9a544a7ff71fd445ea9 - () https://git.kernel.org/stable/c/3ee979709e16a83b257bc9a544a7ff71fd445ea9 - Patch
References () https://git.kernel.org/stable/c/6fe9486d709e4a60990843832501ef6556440ca7 - () https://git.kernel.org/stable/c/6fe9486d709e4a60990843832501ef6556440ca7 - Patch
References () https://git.kernel.org/stable/c/bcd241230fdbc6005230f80a4f8646ff5a84f15b - () https://git.kernel.org/stable/c/bcd241230fdbc6005230f80a4f8646ff5a84f15b - Patch
References () https://git.kernel.org/stable/c/bf876fd9dc2d0c9fff96aef63d4346719f206fc1 - () https://git.kernel.org/stable/c/bf876fd9dc2d0c9fff96aef63d4346719f206fc1 - Patch
References () https://git.kernel.org/stable/c/f4ef928ca504c996f9222eb2c59ac6d6eefd9c75 - () https://git.kernel.org/stable/c/f4ef928ca504c996f9222eb2c59ac6d6eefd9c75 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: remoteproc: core: Liberar rproc-&gt;clean_table después de que rproc_attach() falla Cuando rproc-&gt;state = RPROC_DETACHED se adjunta al procesador remoto a través de rproc_attach(), si rproc_handle_resources() devuelve un error, entonces se debe liberar la tabla limpia; de lo contrario, se producirá la siguiente pérdida de memoria. unreferenced object 0xffff000086a99800 (size 1024): comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s) hex dump (first 32 bytes): 00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............ 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............ backtrace: [&lt;000000008bbe4ca8&gt;] slab_post_alloc_hook+0x98/0x3fc [&lt;000000003b8a272b&gt;] __kmem_cache_alloc_node+0x13c/0x230 [&lt;000000007a507c51&gt;] __kmalloc_node_track_caller+0x5c/0x260 [&lt;0000000037818dae&gt;] kmemdup+0x34/0x60 [&lt;00000000610f7f57&gt;] rproc_boot+0x35c/0x56c [&lt;0000000065f8871a&gt;] rproc_add+0x124/0x17c [&lt;00000000497416ee&gt;] imx_rproc_probe+0x4ec/0x5d4 [&lt;000000003bcaa37d&gt;] platform_probe+0x68/0xd8 [&lt;00000000771577f9&gt;] really_probe+0x110/0x27c [&lt;00000000531fea59&gt;] __driver_probe_device+0x78/0x12c [&lt;0000000080036a04&gt;] driver_probe_device+0x3c/0x118 [&lt;000000007e0bddcb&gt;] __device_attach_driver+0xb8/0xf8 [&lt;000000000cf1fa33&gt;] bus_for_each_drv+0x84/0xe4 [&lt;000000001a53b53e&gt;] __device_attach+0xfc/0x18c [&lt;00000000d1a2a32c&gt;] device_initial_probe+0x14/0x20 [&lt;00000000d8f8b7ae&gt;] bus_probe_device+0xb0/0xb4 unreferenced object 0xffff0000864c9690 (size 16):

25 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 14:15

Updated : 2025-12-23 18:42


NVD link : CVE-2025-38418

Mitre link : CVE-2025-38418

CVE.ORG link : CVE-2025-38418


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime