CVE-2025-38074

Source
https://cve.org/CVERecord?id=CVE-2025-38074
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38074.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38074
Downstream
Related
Published
2025-06-18T09:33:50.006Z
Modified
2026-03-20T12:42:38.881979Z
Summary
vhost-scsi: protect vq->log_used with vq->mutex
Details

In the Linux kernel, the following vulnerability has been resolved:

vhost-scsi: protect vq->log_used with vq->mutex

The vhost-scsi completion path may access vq->logbase when vq->logused is already set to false.

vhost-thread                       QEMU-thread

vhostscsicompletecmdwork() -> vhostaddused() -> vhostaddusedn() if (unlikely(vq->logused)) QEMU disables vq->logused via VHOSTSETVRINGADDR. mutexlock(&vq->mutex); vq->logused = false now! mutex_unlock(&vq->mutex);

                  QEMU gfree(vq->log_base)
    log_used()
    -> log_write(vq->log_base)

Assuming the VMM is QEMU. The vq->log_base is from QEMU userpace and can be reclaimed via gfree(). As a result, this causes invalid memory writes to QEMU userspace.

The control queue path has the same issue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38074.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
057cbf49a1f08297877e46c82f707b1bfea806a8
Fixed
80cf68489681c165ded460930e391b1eb37b5f6f
Fixed
8312a1ccff1566f375191a89b9ba71b6eb48a8cd
Fixed
59614c5acf6688f7af3c245d359082c0e9e53117
Fixed
ca85c2d0db5f8309832be45858b960d933c2131c
Fixed
bd8c9404e44adb9f6219c09b3409a61ab7ce3427
Fixed
c0039e3afda29be469d29b3013d7f9bdee136834
Fixed
f591cf9fce724e5075cc67488c43c6e39e8cbe27

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38074.json"