CVE-2025-38033
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel when Rust code calls core::fmt::write() while FineIBT (a control flow integrity feature) is enabled. The call leads to a kernel panic due to a Control Flow Integrity (CFI) violation. Specifically, core::fmt::write() calls core::fmt::rt::Argument::fmt(), which currently has CFI disabled, causing a Control Protection exception because FineIBT expects certain control flow protections that are not met. This incompatibility causes the kernel to crash (kernel panic). The issue is addressed by making FineIBT disabled by default when Rust is enabled, and it is expected to be fixed in Rust version 1.88 or later.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic (crash) when Rust code that uses core::fmt::write() is executed with FineIBT enabled. A kernel panic results in system instability and potential downtime, which can disrupt services and operations relying on the affected kernel. It may also complicate debugging and system reliability until the issue is resolved by updating Rust or kernel configurations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel panic logs related to FineIBT enabled systems running Rust code that calls core::fmt::write(). Look for kernel BUG messages in dmesg or journalctl logs similar to: '[ 4614.199779] kernel BUG at arch/x86/kernel/cet.c:132!' and 'Oops: invalid opcode: 0000'. You can use commands like 'dmesg | grep -i "kernel BUG"' or 'journalctl -k | grep -i "kernel BUG"' to detect these panic messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves disabling FineIBT when using Rust code in the kernel or ensuring that the Rust compiler version is 1.88 or higher, as the fix is included starting from Rust 1.88. Additionally, the kernel configuration should be adjusted so that CFI_AUTO_DEFAULT depends on !RUST or Rust >= 1.88, preventing FineIBT from being enabled by default when Rust is enabled.