CVE-2025-38150
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of locking mechanisms when modifying network device multicast lists. Specifically, a sleeping function was called from an invalid context within a Read-Copy-Update (RCU) critical section, which is not allowed. The issue arises when calling PACKET_ADD_MEMBERSHIP on a device that is locked for operations, triggering a network device unregister notifier that requires disabling promiscuous or all-multicast modes. These operations need to acquire the network device instance lock, which was incorrectly done inside the RCU critical section. The fix moves the call to packet_dev_mc outside the RCU critical section to ensure proper locking and avoid the invalid context sleep call.
How can this vulnerability impact me? :
This vulnerability can cause kernel bugs such as crashes or instability due to improper locking and sleeping in invalid contexts. This can lead to system instability or denial of service on affected Linux systems when network device multicast membership is modified under certain conditions.