CVE-2025-38313

7.8 HIGH

📋 TL;DR

This CVE describes a double-free memory corruption vulnerability in the Linux kernel's fsl-mc bus driver. When a specific error condition occurs during device allocation, the kernel attempts to free the same memory region twice, potentially leading to system instability or privilege escalation. This affects systems using Freescale/NXP Management Complex (MC) bus functionality in the Linux kernel.

💻 Affected Systems

Products:
  • Linux kernel with fsl-mc bus driver support
Versions: Specific kernel versions containing the vulnerable commit; exact range depends on distribution backports
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when using Freescale/NXP Management Complex (MC) bus functionality. Systems without this hardware/driver are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel mode allowing complete system compromise.

🟠

Likely Case

System crash or kernel panic causing denial of service, requiring system reboot.

🟢

If Mitigated

No impact if the vulnerable code path is not triggered during normal operation.

🌐 Internet-Facing: LOW - This vulnerability requires local access to trigger and is not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger this vulnerability to cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific error conditions in the fsl-mc driver allocation path. This is a local vulnerability requiring kernel access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from the provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/12e4431e5078847791936820bd39df9e1ee26d2e

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.

🔧 Temporary Workarounds

Disable fsl-mc module

linux

Prevent loading of the vulnerable driver if not required

echo 'blacklist fsl_mc_dprc' >> /etc/modprobe.d/blacklist-fsl-mc.conf
rmmod fsl_mc_dprc

🧯 If You Can't Patch

  • Restrict local user access to systems using fsl-mc functionality
  • Implement strict process isolation and limit kernel module loading capabilities

🔍 How to Verify

Check if Vulnerable:

Check if fsl_mc_dprc module is loaded: lsmod | grep fsl_mc_dprc

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions from your distribution

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Double-free detection in kernel logs
  • System crash/reboot events

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="kernel" AND ("double free" OR "kernel panic" OR "BUG: ")

🔗 References

📤 Share & Export