CVE-2025-38327
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's function graph tracer. When the funcgraph-args option is set without enabling the function graph tracer, the kernel incorrectly enables the tracer. Additionally, it unregisters itself even though it was never registered, and when enabled again, it registers twice, causing a warning and potential instability in the kernel tracing system.
How can this vulnerability impact me? :
The vulnerability can cause warnings and errors in the kernel tracing system, potentially leading to instability or unexpected behavior when using function graph tracing. This could affect system reliability or debugging processes that rely on kernel tracing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the state of the function graph tracer and the funcgraph-args option in the Linux kernel tracing subsystem. You can use the following commands to detect signs of the vulnerability: 1. Check if funcgraph-args is enabled: echo 1 > /sys/kernel/tracing/options/funcgraph-args 2. Inspect the trace buffer for inconsistencies or unexpected function graph tracer output while the current tracer is 'nop': head -20 /sys/kernel/tracing/trace 3. Attempt to enable the function graph tracer and observe if an error or warning occurs: echo function_graph > /sys/kernel/tracing/current_tracer If enabling the function graph tracer results in a "write error: Device or resource busy" or kernel warnings in dmesg related to ftrace_startup_subops, it indicates the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves avoiding enabling the funcgraph-args option when the function graph tracer is not already enabled, as this triggers the vulnerability. Additionally, do not attempt to switch the current tracer to function_graph if the system reports it as busy or if warnings appear in dmesg. Applying the Linux kernel update or patch that resolves this issue is the definitive mitigation step.