#VU112191 Use-after-free in Linux kernel - CVE-2025-38161


Vulnerability identifier: #VU112191

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38161

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_get_rsc(), create_resource_common() and mlx5_core_destroy_rq_tracked() functions in drivers/infiniband/hw/mlx5/qpc.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/0a7790cbba654e925243571cf2f24d61603d3ed3
https://git.kernel.org/stable/c/26d2f662d3a6655a82fd8a287e8b1ce471567f36
https://git.kernel.org/stable/c/50ac361ff8914133e3cf6ef184bac90c22cb8d79
https://git.kernel.org/stable/c/5d2ea5aebbb2f3ebde4403f9c55b2b057e5dd2d6
https://git.kernel.org/stable/c/7c4c84cdcc19e89d42f6bf117238e5471173423e
https://git.kernel.org/stable/c/cf32affe6f3801cfb72a65e69c4bc7a8ee9be100
https://git.kernel.org/stable/c/f9784da76ad7be66230e829e743bdf68a2c49e56


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability