We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38408

genirq/irq_sim: Initialize work context pointers properly



Description

In the Linux kernel, the following vulnerability has been resolved: genirq/irq_sim: Initialize work context pointers properly Initialize `ops` member's pointers properly by using kzalloc() instead of kmalloc() when allocating the simulation work context. Otherwise the pointers contain random content leading to invalid dereferencing.

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 19bd7597858dd15802c1d99fcc38e528f469080a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7f73d1def72532bac4d55ea8838f457a6bed955c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8a2277a3c9e4cc5398f80821afe7ecbe9bdf2819
affected

Default status
affected

6.12.37
unaffected

6.15.6
unaffected

6.16-rc3
unaffected

References

git.kernel.org/...c/19bd7597858dd15802c1d99fcc38e528f469080a

git.kernel.org/...c/7f73d1def72532bac4d55ea8838f457a6bed955c

git.kernel.org/...c/8a2277a3c9e4cc5398f80821afe7ecbe9bdf2819

cve.org (CVE-2025-38408)

nvd.nist.gov (CVE-2025-38408)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38408

Support options

Helpdesk Chat, Email, Knowledgebase