
Cloud Vulnerability DB
A community-led vulnerabilities database
A race condition vulnerability was discovered in the Linux kernel (CVE-2025-38102) affecting the VMCI (Virtual Machine Communication Interface) component. The issue was identified and disclosed on July 3, 2025, specifically involving a race between vmci_host_setup_notify and vmci_ctx_unset_notify functions in the Linux kernel version 6.15.0-rc5 (CVE Details).
The vulnerability stems from a race condition between vmci_host_setup_notify and vmci_ctx_unset_notify functions. The issue occurs when context->notify_page is initialized by get_user_pages_fast but can be accessed in vmci_ctx_unset_notify before the initialization is complete. This leads to a warning in try_grab_folio function, specifically at mm/gup.c:147. The race condition manifests when one CPU is executing vmci_host_do_set_notify while another CPU attempts to unset the notification, resulting in a potential page being freed prematurely (CVE Details).
The vulnerability triggers a kernel warning and could potentially lead to system instability or crashes. The issue affects the Virtual Machine Communication Interface (VMCI) component of the Linux kernel, which is used for communication between virtual machines and their hosts (CVE Details).
The fix involves using a local variable page to ensure notify_page can only be accessed after get_user_pages_fast has completed its operation. This prevents the race condition by properly synchronizing access to the page (CVE Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."