CVE-2025-38267
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's ring-buffer mechanism used for tracing events. When reading from a memory-mapped buffer, the reader page is swapped with the last page written. If the reader page is the same as the commit buffer (the buffer currently being written to), it was assumed no events were missed. However, during a commit overrunβwhen an interrupt preempts an event write and adds enough new events to fill and wrap the bufferβevents can be dropped and reported as missed. This legitimate scenario was incorrectly triggering a WARN_ON_ONCE() warning in the kernel, causing unnecessary warnings and potential confusion.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to kernel stability and debugging. It causes the Linux kernel to trigger a warning (WARN_ON_ONCE) incorrectly during legitimate commit overruns in the ring buffer, which can lead to misleading kernel warnings or logs. This may complicate debugging or system monitoring but does not directly cause data corruption or security breaches.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warnings related to ring buffer commit overruns, specifically WARN_ON() messages in the kernel logs indicating missed events in the ring buffer. One way to trigger and observe this is by running commands that heavily use tracing and interrupts, such as: perf record -o perf-test.dat -a -- trace-cmd record --nosplice -e all -p function hackbench 50. Monitoring dmesg or kernel logs for warnings like 'ring_buffer_map_get_reader' WARN_ON messages can help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the issue is fixed by preventing WARN_ON() triggers on legitimate commit overruns in the ring buffer. Until then, reducing the use of heavy tracing with lockdep, KASAN, and kmemleak enabled simultaneously, or avoiding workloads that cause frequent interrupts and buffer overruns, may reduce the chance of triggering the warning.