CVE-2025-38089
BaseFortify
Publication date: 2025-06-30
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's sunrpc subsystem occurs when a client sends a specially crafted packet to a kernel RPC server. If the server's RPC reply decoding fails and returns SVC_GARBAGE without properly setting a pointer (rq_accept_statp), the kernel may dereference a NULL pointer or corrupt memory, causing a crash or memory scribble. The issue arises because the server treats SVC_GARBAGE as a GARBAGE_ARGS reply, but according to RFC 5531, it should reject the RPC with an AUTH_ERR status. The fix changes the handling of SVC_GARBAGE to return an AUTH_ERROR instead, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause a remote crash of the Linux kernel RPC server or memory corruption, potentially leading to denial of service or instability on affected systems. An attacker could exploit this by sending specially crafted packets to trigger the crash or memory issues.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by handling SVC_GARBAGE returns as AUTH_ERROR with a reason of AUTH_BADCRED instead of returning GARBAGE_ARGS, which avoids kernel crashes. Immediate mitigation steps would include updating the Linux kernel to a version that includes this fix to prevent crashes caused by specially crafted RPC packets.