CVE-2025-38067
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.18 (inc) to 5.10.240 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.189 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.146 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.99 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.39 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.9 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the rseq (restartable sequences) feature. The rseq_cs field, which should be set to zero by user-space before registration, is not enforced by the kernel. If this field is non-zero and points to an invalid struct rseq_cs, it can cause a segmentation fault (segfault) when returning to user-space. The fix involves clearing the rseq_cs field on registration if it is non-zero to prevent segfaults, while maintaining compatibility with older glibc versions that reuse rseq areas without clearing this field.
How can this vulnerability impact me? :
This vulnerability can cause a segmentation fault in user-space applications when the rseq_cs field is non-zero and invalid during rseq registration. This may lead to application crashes or instability, especially in multi-threaded programs using restartable sequences, potentially affecting system reliability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is addressed by clearing the rseq_cs field on registration when it is non-zero to prevent segfaults. Immediate mitigation involves updating the Linux kernel to a version where this fix is applied. This prevents segfaults on registration without breaking older glibc versions that reuse rseq areas on thread creation.