CVE-2025-38351
BaseFortify
Publication date: 2025-07-19
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's KVM module for x86 with Hyper-V hypercalls enabled. Specifically, when a guest requests to flush parts of its virtual TLB using certain hypercalls, it can pass non-canonical guest virtual addresses (GVAs). The system did not filter out these invalid addresses, which on Intel CPUs causes an error and warning due to the INVVPID instruction failing. This can lead to unexpected warnings and potential instability. The fix involves skipping non-canonical GVAs during processing to avoid triggering this failure.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause the KVM module on Intel CPUs to trigger warnings and errors related to invalid TLB flush requests, potentially leading to instability or crashes in virtual machines running on affected systems. However, well-behaved guests typically do not request TLB flushes for non-canonical addresses, so the practical impact is limited to malformed or malicious guests causing these errors.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for warnings related to INVVPID failures, specifically messages like 'invvpid failed' and 'WARNING: CPU' from the kvm_intel module. Checking kernel logs (e.g., using 'dmesg' or 'journalctl -k') for such warnings can help identify if the issue is occurring. For example, running 'dmesg | grep invvpid' or 'journalctl -k | grep invvpid' may reveal relevant error messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the fix involves skipping non-canonical addresses during PV TLB flush in KVM guests with Hyper-V hypercalls enabled. Until the update is applied, avoid running untrusted guests that may issue invalid hypercalls. Additionally, monitoring for the described warnings can help in early detection.