We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38076

alloc_tag: allocate percpu counters for module tags dynamically



Description

In the Linux kernel, the following vulnerability has been resolved: alloc_tag: allocate percpu counters for module tags dynamically When a module gets unloaded it checks whether any of its tags are still in use and if so, we keep the memory containing module's allocation tags alive until all tags are unused. However percpu counters referenced by the tags are freed by free_module(). This will lead to UAF if the memory allocated by a module is accessed after module was unloaded. To fix this we allocate percpu counters for module allocation tags dynamically and we keep it alive for tags which are still in use after module unloading. This also removes the requirement of a larger PERCPU_MODULE_RESERVE when memory allocation profiling is enabled because percpu memory for counters does not need to be reserved anymore.

Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

0db6f8d7820a4b788565dac8eed52bfc2c3216da before 3cc733e6d96c938d2b82be96858a0ab900eb6fdc
affected

0db6f8d7820a4b788565dac8eed52bfc2c3216da before 12ca42c237756182aad8ab04654c952765cb9061
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.14.9
unaffected

6.15
unaffected

References

git.kernel.org/...c/3cc733e6d96c938d2b82be96858a0ab900eb6fdc

git.kernel.org/...c/12ca42c237756182aad8ab04654c952765cb9061

cve.org (CVE-2025-38076)

nvd.nist.gov (CVE-2025-38076)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38076

Support options

Helpdesk Chat, Email, Knowledgebase