CVE-2025-38196
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by validating buffer count with offset for cloning in io_uring. Until then, avoid registering io_uring buffers with offset + count exceeding IORING_MAX_REG_BUFFERS to prevent triggering the kmalloc warning.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's io_uring subsystem involves improper validation of buffer counts with offsets during cloning operations. Specifically, the code checks only the total count of buffers but fails to validate that the sum of the offset and buffer count does not exceed the maximum allowed buffers (IORING_MAX_REG_BUFFERS). This can lead to an attempt to allocate an excessively large memory buffer (kmalloc), triggering a kernel warning (WARN_ON) due to the allocation size being too big.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to attempt an excessively large memory allocation, which triggers a kernel warning and potentially leads to instability or denial of service conditions. While it does not directly indicate code execution or privilege escalation, the kernel warning and improper memory allocation can disrupt normal system operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for warnings related to kmalloc() attempts that are too large, specifically messages like: WARNING: CPU: ... at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640. You can use the command 'dmesg | grep kmalloc' or 'journalctl -k | grep kmalloc' to check for such warnings in the kernel logs.