CVE-2025-38029
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Kernel Address Sanitizer (kasan) where a function called apply_to_pte_range() enters a lazy MMU mode and calls a callback kasan_populate_vmalloc_pte() on each page table walk iteration. The callback can sleep when trying to allocate a single page, which is not allowed in the atomic context where preemption is disabled. This can cause a crash on certain architectures like s390. The fix involves bulk-allocating the shadow memory before applying the callback to avoid sleeping in atomic context.
How can this vulnerability impact me? :
This vulnerability can cause system crashes due to sleeping functions being called from invalid atomic contexts in the Linux kernel. Such crashes can lead to system instability or denial of service, impacting the reliability and availability of systems running vulnerable kernel versions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel BUG messages indicating a sleeping function called from invalid context, especially messages similar to the provided kernel log snippet showing 'BUG: sleeping function called from invalid context' and stack traces involving apply_to_pte_range and kasan_populate_vmalloc_pte. You can check the kernel logs using commands like 'dmesg | grep -i "BUG: sleeping function called from invalid context"' or 'journalctl -k | grep -i "BUG: sleeping function called from invalid context"'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this issue is resolved. The fix involves changing the allocation strategy to bulk-allocate shadow memory prior to applying the kasan_populate_vmalloc_pte() callback, preventing sleepable page allocation from atomic context. Until an updated kernel is applied, monitoring for related kernel BUG messages and avoiding workloads that trigger this condition may help reduce risk.