CVE-2025-38418
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
remoteproc: core: Release rproc->clean_table after rproc_attach() fails<br />
<br />
When rproc->state = RPROC_DETACHED is attached to remote processor<br />
through rproc_attach(), if rproc_handle_resources() returns failure,<br />
then the clean table should be released, otherwise the following<br />
memory leak will occur.<br />
<br />
unreferenced object 0xffff000086a99800 (size 1024):<br />
comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s)<br />
hex dump (first 32 bytes):<br />
00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............<br />
00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............<br />
backtrace:<br />
[] slab_post_alloc_hook+0x98/0x3fc<br />
[] __kmem_cache_alloc_node+0x13c/0x230<br />
[] __kmalloc_node_track_caller+0x5c/0x260<br />
[] kmemdup+0x34/0x60<br />
[] rproc_boot+0x35c/0x56c<br />
[] rproc_add+0x124/0x17c<br />
[] imx_rproc_probe+0x4ec/0x5d4<br />
[] platform_probe+0x68/0xd8<br />
[] really_probe+0x110/0x27c<br />
[] __driver_probe_device+0x78/0x12c<br />
[] driver_probe_device+0x3c/0x118<br />
[] __device_attach_driver+0xb8/0xf8<br />
[] bus_for_each_drv+0x84/0xe4<br />
[] __device_attach+0xfc/0x18c<br />
[] device_initial_probe+0x14/0x20<br />
[] bus_probe_device+0xb0/0xb4<br />
unreferenced object 0xffff0000864c9690 (size 16):
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3562c09feeb8d8e9d102ce6840e8c7d57a7feb5c
- https://git.kernel.org/stable/c/3ee979709e16a83b257bc9a544a7ff71fd445ea9
- https://git.kernel.org/stable/c/6fe9486d709e4a60990843832501ef6556440ca7
- https://git.kernel.org/stable/c/bcd241230fdbc6005230f80a4f8646ff5a84f15b
- https://git.kernel.org/stable/c/bf876fd9dc2d0c9fff96aef63d4346719f206fc1
- https://git.kernel.org/stable/c/f4ef928ca504c996f9222eb2c59ac6d6eefd9c75
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



