CVE-2025-38681

In the Linux kernel, the following vulnerability has been resolved: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() Memory hot remove unmaps and tears down various kernel page table regions as required. The ptdump code can race with concurrent modifications of the kernel page tables. When leaf entries are modified concurrently, the dump code may log stale or inconsistent information for a VA range, but this is otherwise not harmful. But when intermediate levels of kernel page table are freed, the dump code will continue to use memory that has been freed and potentially reallocated for another purpose. In such cases, the ptdump code may dereference bogus addresses, leading to a number of potential problems. To avoid the above mentioned race condition, platforms such as arm64, riscv and s390 take memory hotplug lock, while dumping kernel page table via the sysfs interface /sys/kernel/debug/kernel_page_tables. Similar race condition exists while checking for pages that might have been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages which in turn calls ptdump_check_wx(). Instead of solving this race condition again, let's just move the memory hotplug lock inside generic ptdump_check_wx() which will benefit both the scenarios. Drop get_online_mems() and put_online_mems() combination from all existing platform ptdump code paths.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 22:32

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425 - () https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425 - Patch
References () https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8 - () https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8 - Patch
References () https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a - () https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a - Patch
References () https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4 - () https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4 - Patch
References () https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f - () https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f - Patch
References () https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd - () https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd - Patch
References () https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b - () https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b - Patch
References () https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83 - () https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-362
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

04 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 16:15

Updated : 2026-01-08 22:32


NVD link : CVE-2025-38681

Mitre link : CVE-2025-38681

CVE.ORG link : CVE-2025-38681


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')