CVE-2025-38074
📋 TL;DR
This CVE describes a race condition vulnerability in the Linux kernel's vhost-scsi subsystem where the vhost thread may access freed memory when QEMU disables logging. This could allow a malicious QEMU instance or compromised VMM to cause memory corruption in the kernel, potentially leading to system crashes or privilege escalation. Systems using vhost-scsi with QEMU/KVM virtualization are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to privilege escalation, system crash, or arbitrary code execution in kernel context.
Likely Case
System instability, kernel panic, or denial of service due to invalid memory access.
If Mitigated
No impact if proper kernel patches are applied or vhost-scsi is not in use.
🎯 Exploit Status
Exploitation requires race condition timing and access to control the VMM/QEMU instance. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel commits: 59614c5acf6688f7af3c245d359082c0e9e53117, 80cf68489681c165ded460930e391b1eb37b5f6f, 8312a1ccff1566f375191a89b9ba71b6eb48a8cd, bd8c9404e44adb9f6219c09b3409a61ab7ce3427, c0039e3afda29be469d29b3013d7f9bdee136834
Vendor Advisory: https://git.kernel.org/stable/c/59614c5acf6688f7af3c245d359082c0e9e53117
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable vhost-scsi
linuxDisable the vhost-scsi module if not required for your virtualization setup
echo 'blacklist vhost_scsi' >> /etc/modprobe.d/blacklist-vhost-scsi.conf
rmmod vhost_scsi
🧯 If You Can't Patch
- Disable vhost-scsi module if not required for your virtualization workloads
- Isolate virtualization hosts and restrict access to VMM management interfaces
🔍 How to Verify
Check if Vulnerable:
Check if vhost_scsi module is loaded: lsmod | grep vhost_scsi. If loaded and kernel version is before fix commits, system may be vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits or verify vhost_scsi module is not loaded if disabled as workaround.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Oops messages related to vhost_scsi
- Memory corruption errors in kernel logs
SIEM Query:
source="kernel" AND ("vhost_scsi" OR "Oops" OR "general protection fault")
🔗 References
- https://git.kernel.org/stable/c/59614c5acf6688f7af3c245d359082c0e9e53117
- https://git.kernel.org/stable/c/80cf68489681c165ded460930e391b1eb37b5f6f
- https://git.kernel.org/stable/c/8312a1ccff1566f375191a89b9ba71b6eb48a8cd
- https://git.kernel.org/stable/c/bd8c9404e44adb9f6219c09b3409a61ab7ce3427
- https://git.kernel.org/stable/c/c0039e3afda29be469d29b3013d7f9bdee136834
- https://git.kernel.org/stable/c/ca85c2d0db5f8309832be45858b960d933c2131c
- https://git.kernel.org/stable/c/f591cf9fce724e5075cc67488c43c6e39e8cbe27
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html