CVE-2025-38261
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel on riscv architecture involves improper handling of the SR_SUM status bit during thread/task switches. Specifically, the SR_SUM state was not correctly saved and restored when switching between threads, which could lead to kernel crashes under heavy load. The issue was caused by the put_user() macro in schedule_tail() enabling user access before evaluating its argument, which could cause a sleeping function to clear SR_SUM and trigger a kernel panic. The fix involved evaluating the argument before enabling user access and ensuring switch_to() saves and restores SR_SUM properly.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes and system instability on riscv-based Linux systems, especially under heavy load or stress testing. Such crashes can lead to denial of service, data loss, or system downtime, impacting the reliability and availability of affected systems.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the issue by ensuring the SR_SUM state is saved and restored correctly during thread/task switches in the riscv architecture. Specifically, update the Linux kernel to a version that includes the commit 'riscv: evaluate put_user() arg before enabling user access' (commit 285a76bb2cf5) which addresses this vulnerability.