Wind River Support Network

HomeDefectsLIN1024-9986
Acknowledged

LIN1024-9986 : Security Advisory - linux - CVE-2025-38074

Created: Jun 19, 2025    Updated: Jun 20, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]vhost-scsi: protect vq->log_used with vq->mutex[EOL][EOL]The vhost-scsi completion path may access vq->log_base when vq->log_used is[EOL]already set to false.[EOL][EOL]    vhost-thread                       QEMU-thread[EOL][EOL]vhost_scsi_complete_cmd_work()[EOL]-> vhost_add_used()[EOL]   -> vhost_add_used_n()[EOL]      if (unlikely(vq->log_used))[EOL]                                      QEMU disables vq->log_used[EOL]                                      via VHOST_SET_VRING_ADDR.[EOL]                                      mutex_lock(&vq->mutex);[EOL]                                      vq->log_used = false now![EOL]                                      mutex_unlock(&vq->mutex);[EOL][EOL]\t\t\t\t      QEMU gfree(vq->log_base)[EOL]        log_used()[EOL]        -> log_write(vq->log_base)[EOL][EOL]Assuming the VMM is QEMU. The vq->log_base is from QEMU userpace and can be[EOL]reclaimed via gfree(). As a result, this causes invalid memory writes to[EOL]QEMU userspace.[EOL][EOL]The control queue path has the same issue.

CREATE(Triage):(User=lchen-cn) [CVE-2025-38074 (https://nvd.nist.gov/vuln/detail/CVE-2025-38074)
Live chat
Online