Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38071
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-18 Jun, 2025 | 09:33
Updated At-02 Jan, 2026 | 15:29
Rejected At-
▼CVE Numbering Authority (CNA)
x86/mm: Check return value from memblock_phys_alloc_range()

In the Linux kernel, the following vulnerability has been resolved: x86/mm: Check return value from memblock_phys_alloc_range() At least with CONFIG_PHYSICAL_START=0x100000, if there is < 4 MiB of contiguous free memory available at this point, the kernel will crash and burn because memblock_phys_alloc_range() returns 0 on failure, which leads memblock_phys_free() to throw the first 4 MiB of physical memory to the wolves. At a minimum it should fail gracefully with a meaningful diagnostic, but in fact everything seems to work fine without the weird reserve allocation.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/mm/init.c
Default Status
unaffected
Versions
Affected
  • From a7259df7670240ee03b0cfce8a3e5d3773911e24 before 8c18c904d301ffeb33b071eadc55cd6131e1e9be (git)
  • From a7259df7670240ee03b0cfce8a3e5d3773911e24 before bffd5f2815c5234d609725cd0dc2f4bc5de2fc67 (git)
  • From a7259df7670240ee03b0cfce8a3e5d3773911e24 before c6f2694c580c27dca0cf7546ee9b4bfa6b940e38 (git)
  • From a7259df7670240ee03b0cfce8a3e5d3773911e24 before dde4800d2b0f68b945fd81d4fc2d4a10ae25f743 (git)
  • From a7259df7670240ee03b0cfce8a3e5d3773911e24 before 631ca8909fd5c62b9fda9edda93924311a78a9c4 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/mm/init.c
Default Status
affected
Versions
Affected
  • 5.15
Unaffected
  • From 0 before 5.15 (semver)
  • From 6.1.141 through 6.1.* (semver)
  • From 6.6.93 through 6.6.* (semver)
  • From 6.12.31 through 6.12.* (semver)
  • From 6.14.9 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8c18c904d301ffeb33b071eadc55cd6131e1e9be
N/A
https://git.kernel.org/stable/c/bffd5f2815c5234d609725cd0dc2f4bc5de2fc67
N/A
https://git.kernel.org/stable/c/c6f2694c580c27dca0cf7546ee9b4bfa6b940e38
N/A
https://git.kernel.org/stable/c/dde4800d2b0f68b945fd81d4fc2d4a10ae25f743
N/A
https://git.kernel.org/stable/c/631ca8909fd5c62b9fda9edda93924311a78a9c4
N/A
Hyperlink: https://git.kernel.org/stable/c/8c18c904d301ffeb33b071eadc55cd6131e1e9be
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bffd5f2815c5234d609725cd0dc2f4bc5de2fc67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c6f2694c580c27dca0cf7546ee9b4bfa6b940e38
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dde4800d2b0f68b945fd81d4fc2d4a10ae25f743
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/631ca8909fd5c62b9fda9edda93924311a78a9c4
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Details not found