Use-after-free in Linux kernel sw rxe driver



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-38024
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU111468

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38024

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rxe_cq_from_init() function in drivers/infiniband/sw/rxe/rxe_cq.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions

CPE2.3 External links

https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980
https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df
https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759
https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591
https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230
https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a
https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae
https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###