CVE-2025-38324
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper usage of Read-Copy-Update (RCU) mechanisms in the Linux kernel's MPLS (Multiprotocol Label Switching) routing code. Specifically, the function mpls_route_input_rcu() was using rcu_dereference_check() incorrectly, which could lead to warnings or potential issues when called under the RTNL (routing netlink) lock context. The fix was to replace rcu_dereference_check() with rcu_dereference_rtnl() in mpls_route_input_rcu() to properly handle the RCU dereference under RTNL locking, preventing suspicious RCU usage.
How can this vulnerability impact me? :
The vulnerability relates to incorrect synchronization in the Linux kernel networking code, which could lead to kernel warnings or instability when MPLS routing functions are called. While the description does not explicitly mention exploitation or direct security impact, improper RCU usage can potentially cause kernel crashes or undefined behavior, which may affect system stability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to suspicious RCU usage in the Linux kernel's MPLS code, specifically in mpls_route_input_rcu(). Detection would involve monitoring kernel logs for warnings about suspicious RCU usage or lockdep warnings related to rtnl_mutex and mpls_route_input_rcu(). You can check the kernel logs using commands like 'dmesg | grep -i rcu' or 'journalctl -k | grep -i rcu' to look for suspicious RCU usage messages. Additionally, monitoring for kernel warnings or stack traces involving mpls_route_input_rcu() or rtnl_mutex may help detect exploitation or presence of the issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by updating the Linux kernel to use rcu_dereference_rtnl() in mpls_route_input_rcu(). Immediate mitigation steps include updating your Linux kernel to a version that includes this fix. Until then, limiting or disabling MPLS functionality if not needed may reduce exposure. Monitoring kernel logs for suspicious RCU usage warnings can also help identify attempts to trigger the issue.