SB2025071052 - Use-after-free in Linux kernel cpu sgx
Published: July 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-38334)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the arch_memory_failure() function in arch/x86/kernel/cpu/sgx/main.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/00a88e9ea1b170d579c56327c38f7e8cf689df87
- https://git.kernel.org/stable/c/31dcbac94bfeabb86bf85b0c36803fdd6536437b
- https://git.kernel.org/stable/c/62b62a2a6dc51ed6e8e334861f04220c9cf8106a
- https://git.kernel.org/stable/c/dc5de5bd6deabd327ced2b2b1d0b4f14cd146afe
- https://git.kernel.org/stable/c/ed16618c380c32c68c06186d0ccbb0d5e0586e59