CVE-2025-38681

4.7 MEDIUM

📋 TL;DR

A race condition in the Linux kernel's page table dump functionality could allow concurrent memory hot removal operations to cause the kernel to access freed memory. This affects systems where kernel page table debugging is enabled via /sys/kernel/debug/kernel_page_tables. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when CONFIG_PTDUMP_DEBUGFS is enabled and /sys/kernel/debug/kernel_page_tables is accessible. Memory hotplug capability must also be present.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel crash or memory corruption leading to system instability, denial of service, or potential privilege escalation if freed memory is reallocated for malicious purposes.

🟠

Likely Case

System crash or kernel panic when memory hot removal occurs concurrently with page table dumping operations.

🟢

If Mitigated

No impact if kernel page table debugging is disabled or memory hotplug is not used.

🌐 Internet-Facing: LOW - Requires local access to the system and specific debugging interfaces enabled.
🏢 Internal Only: MEDIUM - Could be exploited by local users or administrators with access to debugging interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access, specific debugging features enabled, and timing memory hot removal operations with page table dumping.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 1636b5e9c3543b87d673e32a47e7c18698882425 and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable kernel page table debugging

all

Remove access to vulnerable debugging interfaces

echo 0 > /sys/kernel/debug/kernel_page_tables/enable
chmod 000 /sys/kernel/debug/kernel_page_tables

Disable memory hotplug

all

Prevent concurrent memory removal operations

echo offline > /sys/devices/system/memory/memoryX/state (for specific memory blocks)
Set kernel parameter memhp_default_state=offline at boot

🧯 If You Can't Patch

  • Restrict access to /sys/kernel/debug/kernel_page_tables to root only
  • Disable CONFIG_PTDUMP_DEBUGFS in kernel configuration and rebuild

🔍 How to Verify

Check if Vulnerable:

Check if /sys/kernel/debug/kernel_page_tables exists and is accessible, and verify kernel version against patched releases from your distribution.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains the fix commits or is newer than the patched release from your vendor.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Oops messages related to page table walking
  • Memory corruption warnings in dmesg

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or memory access violations in system logs

🔗 References

📤 Share & Export