CVE-2025-38279
BaseFortify
Publication date: 2025-07-10
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.15.0-rc4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the BPF (Berkeley Packet Filter) verifier's backtracking mechanism. Specifically, the issue was that the stack pointer register was incorrectly included in precision backtracking bookkeeping, which led to a verifier backtracking bug warning in the kernel logs. The problem occurs during the verification of BPF programs, where certain registers and stack slots should have been zeroed out but were not handled correctly, causing the verifier to fail and emit warnings. The fix involved not including the stack pointer register in this bookkeeping to prevent the bug.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel's BPF verifier to fail verification of certain BPF programs, leading to warnings and potential errors when loading or running these programs. This could impact system stability or the ability to use BPF-based features or modules correctly. However, there is no indication from the provided information that this leads to privilege escalation or remote code execution.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel dmesg logs for the specific warning message: 'verifier backtracking bug'. You can use the command 'dmesg | grep "verifier backtracking bug"' to check if this warning appears in your system logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability has been resolved, as it relates to a kernel bug in the BPF verifier. There are no specific workarounds mentioned, so applying the patch or upgrading the kernel is recommended.