
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free (UAF) vulnerability has been identified in the Linux kernel's Xen subsystem, specifically in the dmabufexpfrom_pages() function. The vulnerability was disclosed on August 19, 2025, and affects the Linux kernel's handling of DMA buffer file descriptors (NVD).
The vulnerability occurs in the dmabufexpfrompages() function where a race condition exists during file descriptor handling. After inserting a file reference into the descriptor table, another thread could close it, leading to potential use-after-free scenarios when accessing objects that would be destroyed on close, including the struct file itself or anything destroyed by its ->release() function. The issue specifically involves the dmabuffd() function, which combines descriptor reservation and fdinstall() operations (NVD).
The vulnerability could potentially lead to use-after-free conditions in the kernel's memory management, which could result in system crashes, memory corruption, or potential privilege escalation. The issue affects the kernel's DMA buffer handling mechanisms, which are critical for memory management and device interactions (NVD).
The fix involves restructuring the descriptor handling process by reserving the descriptor before any other operations and performing fd_install() only after all setup is complete. This prevents the race condition by ensuring proper synchronization of file descriptor operations (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."