CVE-2025-38024

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug<br /> <br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:94 [inline]<br /> dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120<br /> print_address_description mm/kasan/report.c:378 [inline]<br /> print_report+0xcf/0x610 mm/kasan/report.c:489<br /> kasan_report+0xb5/0xe0 mm/kasan/report.c:602<br /> rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195<br /> rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132<br /> __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232<br /> rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109<br /> create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052<br /> ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095<br /> ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679<br /> vfs_write fs/read_write.c:677 [inline]<br /> vfs_write+0x26a/0xcc0 fs/read_write.c:659<br /> ksys_write+0x1b8/0x200 fs/read_write.c:731<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> <br /> In the function rxe_create_cq, when rxe_cq_from_init fails, the function<br /> rxe_cleanup will be called to handle the allocated resources. In fact,<br /> some memory resources have already been freed in the function<br /> rxe_cq_from_init. Thus, this problem will occur.<br /> <br /> The solution is to let rxe_cleanup do all the work.

Impact