CVE-2025-38129 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV3.2
EPSS
0.0%
top 93.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 3
Latest updateApr 18
Description
In the Linux kernel, the following vulnerability has been resolved:
page_pool: Fix use-after-free in page_pool_recycle_in_ring
syzbot reported a uaf in page_pool_recycle_in_ring:
BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943
CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Go…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages8 packages
▶CVEListV5linux/linuxff7d6b27f894f1469dc51ccb828b7363ccd9799f — d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8+6
Patches
🔴Vulnerability Details
33VulDB▶
Linux Kernel up to 6.12.33/6.15.2 page_pool page_pool_recycle_in_ring use after free (EUVD-2025-19814 / Nessus ID 264474)↗2026-04-18
📋Vendor Advisories
33💬Community
1Bugzilla▶
CVE-2025-38129 kernel: Linux kernel: Use-after-free vulnerability in page_pool_recycle_in_ring can lead to arbitrary code execution↗2025-07-03