SB2025090461 - Use-after-free in Linux kernel arm64 mm
Published: September 4, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-38681)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ptdump_walk_pgd() function in mm/ptdump.c, within the ptdump_show() function in arch/s390/mm/dump_pagetables.c, within the ptdump_show() function in arch/arm64/mm/ptdump_debugfs.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1636b5e9c3543b87d673e32a47e7c18698882425
- https://git.kernel.org/stable/c/3ee9a8c27bfd72c3f465004fa8455785d61be5e8
- https://git.kernel.org/stable/c/59305202c67fea50378dcad0cc199dbc13a0e99a
- https://git.kernel.org/stable/c/67995d4244694928ce701928e530b5b4adeb17b4
- https://git.kernel.org/stable/c/69bea84b06b5e779627e7afdbf4b60a7d231c76f
- https://git.kernel.org/stable/c/ac25ec5fa2bf6e606dc7954488e4dded272fa9cd
- https://git.kernel.org/stable/c/ca8c414499f2e5337a95a76be0d21b728ee31c6b
- https://git.kernel.org/stable/c/ff40839e018b82c4d756d035f34a63aa2d93be83