CVE-2025-38285
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.2 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (inc) |
| debian | debian_linux | 11.0 |
| linux | kernel | 6.15.0-rc5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's BPF (Berkeley Packet Filter) subsystem, specifically in the function get_bpf_raw_tp_regs. It causes a WARN_ON_ONCE warning to be triggered due to a corner case involving nested calls from tracepoints like trace_mmap_lock_acquire_returned. The issue was reported by syzkaller and results in a kernel warning, which has been fixed by removing the WARN_ON_ONCE call.
How can this vulnerability impact me? :
The vulnerability causes a kernel warning (WARN_ON_ONCE) to be triggered, which may indicate instability or unexpected behavior in the kernel's BPF tracing functionality. While it does not explicitly mention crashes or security breaches, such warnings can potentially lead to system instability or debugging difficulties.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for WARN() messages related to get_bpf_raw_tp_regs in the bpf_trace.c file. You can check the kernel log using the command: dmesg | grep 'get_bpf_raw_tp_regs' or journalctl -k | grep 'get_bpf_raw_tp_regs'. These warnings indicate the presence of the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this issue is fixed, as the vulnerability is resolved by removing the WARN_ON_ONCE in get_bpf_raw_tp_regs. Until then, monitoring for the WARN() messages and avoiding triggering the related tracepoints may help reduce impact.